Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
0ee4b82c9e7d067a13d13c13915fc1e3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0ee4b82c9e7d067a13d13c13915fc1e3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0ee4b82c9e7d067a13d13c13915fc1e3_JaffaCakes118.html
-
Size
68KB
-
MD5
0ee4b82c9e7d067a13d13c13915fc1e3
-
SHA1
2625f26ecd82fdde1975dc88557da73bac4bbffb
-
SHA256
fe652f39c55ad266528908633116522ade33f189af9a4f8f2b1e96dff7675d94
-
SHA512
d2a10cb8522c3519b56bc27cd9ad957784e8a6b997dc20e99350d9f10871535047ac62b6598bc43c483cc734f04dd7ca5bb597d6190f7e0282bf75cd3e27b32c
-
SSDEEP
768:JiWgc8nX9z+rbXTWWYAAYGgbZbrPgb88YxoTyvC8koTnMdzbBnfBgN8ZYyxoogQm:JgNNzTiGsBlGTbpc0zbrga5TNnGx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 1492 msedge.exe 1492 msedge.exe 1004 identity_helper.exe 1004 identity_helper.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1212 1492 msedge.exe 85 PID 1492 wrote to memory of 1212 1492 msedge.exe 85 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 3008 1492 msedge.exe 86 PID 1492 wrote to memory of 2312 1492 msedge.exe 87 PID 1492 wrote to memory of 2312 1492 msedge.exe 87 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88 PID 1492 wrote to memory of 2568 1492 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0ee4b82c9e7d067a13d13c13915fc1e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa44546f8,0x7ffaa4454708,0x7ffaa44547182⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,473734412999471534,11647267067616261141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
5KB
MD57e0cd31cef6e16c88d04d1fe117eecd6
SHA1b8c5a4f7fa2457253e6961f14ab75763ca964744
SHA2567cbfcdab939d7a9745c73b9db77dce22496a028c4af77a96e88de9280f4b38db
SHA512eb1b7a2792e347b255cd79635468eed2f409cd9bb7abd0bb5fd1ca27a72cd5cf02481ad83b2212ff3299469ce59dae72cc5bffff7bbaef76ff7f02b2ae14213e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c906ea2c-cc14-49f9-80e7-105618d0d863.tmp
Filesize6KB
MD52ceb040e4fcd83ca07a97684cfb43e70
SHA19a0187110d0b3587f761525281f27cc845889ead
SHA256352e1353ddcb56349e7db5361cc0069c54bdf43eeb7fa4a2a0b2bdad1dc71b8d
SHA5129ac2089b9a4f43b6e91b1ec2952b5993bd7923116a4b3d096c18e659b51b2cfced8247c39184751cdfc9d480f289a52c4c6de7351528ba5a3d7404887a87627c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD576958e9a1020d8152e0846ed23fa6165
SHA1a593be229828c66f12df3fcf21f805f6346316a8
SHA2568d67d926fe0ac2c3cc4abef03c9e5b07caaa7380483bacadacc64863dd08d99c
SHA5126663b1e84bfe8821634fff49025e3547439da4798711c0a5f2d950602d3edc30820388bb7312fbe6f325856f1221047f7a170f3ce2ac7e5245456b2de9be3b85