Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
0efa41a0349017edd8b025836a5f983f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0efa41a0349017edd8b025836a5f983f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0efa41a0349017edd8b025836a5f983f_JaffaCakes118.html
-
Size
23KB
-
MD5
0efa41a0349017edd8b025836a5f983f
-
SHA1
95dd3033a81bb7ae443b35d002d024e429e4ceee
-
SHA256
fbb4dd985c9371e01341fc1d76c2a340b1932b740a8f68551d4ff690b7ea1fb0
-
SHA512
e3af20cd6fcaf59d11ddb4ed2a2d51197eec2792bc03003b7771a4dbabfbfd345bc1797083232469e94e4a60215dbd15a219c3651bcc725869281d5b035917fa
-
SSDEEP
192:uW3gb5nmenQjxn5Q/dnQieYNnWnQOkEntL7nQTbnxnQqCnQtSwMB4qnYnQ7tn+Yy:jQ/MiHb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 3780 msedge.exe 3780 msedge.exe 1780 identity_helper.exe 1780 identity_helper.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3780 wrote to memory of 4092 3780 msedge.exe 83 PID 3780 wrote to memory of 4092 3780 msedge.exe 83 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 2988 3780 msedge.exe 84 PID 3780 wrote to memory of 1764 3780 msedge.exe 85 PID 3780 wrote to memory of 1764 3780 msedge.exe 85 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86 PID 3780 wrote to memory of 2592 3780 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0efa41a0349017edd8b025836a5f983f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a24346f8,0x7ff8a2434708,0x7ff8a24347182⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17918756647645043754,5114197836984284649,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5520 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD52203f36984ad20e0c7c2a6025a86de87
SHA1f915e864db9fbcb59563605b2b8e70c8e0819766
SHA256323369aa1fa99d3fb516c4bdf7dfba0dad8e7c3c5a9a6d7e246f5fa7d4e3a0e9
SHA5124027df9b1e57424db8ac3e84234041bf66b58d982a4e207df945be20b992e601c24f844b65e7859779b20e78bfa94bdc4d6db19a5fa393300bd7cefec248bbf2
-
Filesize
5KB
MD58b92b01fced1ab7e9ee48b8ee5c64abc
SHA1226c688ca34a04f5afd127637ba6b20587edffd2
SHA256aca73939e18bd4ad3d055ab8633d74655956b49ad7c079c2dc63951f6e7ea9a8
SHA512e88ef51600f13320dfcd570e2d1bcc5579a12557270e0df9dc0cbd8f9c6e4d58798b2a49ddb2c6167ac35510ee6493ecbbda1f7e66899be02a0e58e21bb446d0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD562ccac7e312fc013c6796379bd835c9b
SHA123e2672adb5aaef304d1ae6c8e978663391cde6d
SHA25669619ada1c826d3dc2236304729b268f752786f99c1d71f4f2888f270df8d8df
SHA512107b473a9e0a16d3a83590cdfc2663f25e9d1c34c0b321a08f6fe7846f9954ceaefc8f87aeaf41f1b7ea12cb20b017b8f9a9663bfe7e185b128906e82a027860