Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
0f36c498f4310e96b0bd7eee40d73511_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0f36c498f4310e96b0bd7eee40d73511_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f36c498f4310e96b0bd7eee40d73511_JaffaCakes118.html
-
Size
4KB
-
MD5
0f36c498f4310e96b0bd7eee40d73511
-
SHA1
eda55f10d1d833779af0378fa6c0b44eb0078733
-
SHA256
8147e25553c23f60a2cac7850633606cf6787e30c6bd9e2eb5fcd683f806507a
-
SHA512
9f64500b24a5fdcd280640440ea3bd4015167f9bfc93cf36aadd306579beffc9bba02f4a6586d5c1fc7a2d22b548e7ab2108927ac0ff3f5421628838f5aa0266
-
SSDEEP
96:ziEOCmV4MSEPBDvV0n47ej/hgOKiljTR1QnyneEh1G1Ydd9s2U:zizdV4GD8/h/KiZ7Qn/ETGWj9U
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 772 msedge.exe 772 msedge.exe 3144 identity_helper.exe 3144 identity_helper.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 772 wrote to memory of 1804 772 msedge.exe 84 PID 772 wrote to memory of 1804 772 msedge.exe 84 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1100 772 msedge.exe 85 PID 772 wrote to memory of 1148 772 msedge.exe 86 PID 772 wrote to memory of 1148 772 msedge.exe 86 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87 PID 772 wrote to memory of 1128 772 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0f36c498f4310e96b0bd7eee40d73511_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb784b46f8,0x7ffb784b4708,0x7ffb784b47182⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,7805507073783633341,14948636598706897581,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5c8d68b5b557a2492c68e8f74386dc042
SHA147e1eb830b59cf6ccac98b6abc8b00e2cc1e1a18
SHA25642f47ee2f16538728a2fb7002bb28139a4cd643f007983e6aa8d86addbf9695e
SHA5128537187e40e67e1417b56e0bd9400155c56c3f3e780dcd0bcf7009a0596de3d1d772fb82166e3e5a75472b8b1c88fba43e3a218258467ed3e1615dd9988fffb0
-
Filesize
1014B
MD52d2dbceb20c646882b29113a178e9750
SHA1a076d0acae57e8b786b2efdb1b3c2fbb41d5a059
SHA256121b2b8121133bd8e5ae3002e27b17a7cab1c0d617b4c5341351d815c799725b
SHA5123e1a1927e494e5d73740585ad5ed22917624339f4ffb3b19604323584dbf6ba5504c7ae4f757016f675a7e821912094407ae0ae61111707d0a8f057445faf51e
-
Filesize
5KB
MD5c7cab17b8408ec70bb12b202faa283de
SHA1f16198d17eccb36ee5d664236009dc99126630d4
SHA25613200e1b9f8637f14a5505887b5870c3f41db32b03f898b724c45b2469cc595c
SHA51229efd1ab579a842ad59ec67ed670526038ea5cfc1e84da6ec2e3616170593c5e54ed58c581ddd776e1e4d91e6018fb568702438b1f6f6bab444c6d4f055d28b9
-
Filesize
6KB
MD5939a1496398698fa00c0a3b58e3ab614
SHA1196104fa3dc8267dab641233c10f4238fe8de8fa
SHA256a874db8139a3f42a56dfcbcf2e32ac3986583babcc091bf19293a92484504417
SHA51212738bd0aff7069c933a1a6fbd4e798a2e62a4cf81dcd6b904621162fd6bdf86212bb83d25a7fb3c26d70d9e661f21c58444991c70597ee0a9564cf367072ddd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c0323f461406b19f2fa2352121575ec5
SHA10797d275ef5bf464b590d4d89b8b9b5ad7a4f0d2
SHA2562f2c6476bf87fa289f38d10d11cebeb48e5803eca934bf67f37c3efe5a88e67d
SHA512fdf239112850999726566961f49ce558f853bdf043b6aa505f5a8571bc014a278fc059bee3d8cadff1f84853336e9daa0cac3105df2c43c838dd83e2d8b7b07a