Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
0f4eb84fd37535b6094e8e40a0bc31c5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f4eb84fd37535b6094e8e40a0bc31c5_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f4eb84fd37535b6094e8e40a0bc31c5_JaffaCakes118.html
-
Size
54KB
-
MD5
0f4eb84fd37535b6094e8e40a0bc31c5
-
SHA1
392b5867bd0f5ff16ca61d9c465d319ebf3a61dc
-
SHA256
124d07de59dbd4691f6f649c0b70ad508942305649653ad33da242f33a9712d1
-
SHA512
9bbe88f1ef15943c82e70d920bd2b9ed130460d7f80497ae3f271d5f488900df410f87e3ace3cc7663296ac999759d1d9f8d4cb5116b407b76dcbd8e0f559a25
-
SSDEEP
768:le+39cYzvzMyFgBQDMlYrhh1wUMlNFhYJcSEPrADq1GsriQ/9N1H9YIo+N/D7aPQ:le+5LzMyFgBQt1CYa7ouVXH9YIo+NeQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2912 msedge.exe 2912 msedge.exe 760 identity_helper.exe 760 identity_helper.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 4400 2912 msedge.exe 83 PID 2912 wrote to memory of 4400 2912 msedge.exe 83 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 1872 2912 msedge.exe 84 PID 2912 wrote to memory of 2444 2912 msedge.exe 85 PID 2912 wrote to memory of 2444 2912 msedge.exe 85 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86 PID 2912 wrote to memory of 3064 2912 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0f4eb84fd37535b6094e8e40a0bc31c5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a5b546f8,0x7ff8a5b54708,0x7ff8a5b547182⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,1882947864278356763,11944993838176385526,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c0d674b738fd3c22946658b9c4373c89
SHA1a73ec8028365e665fd87185d9332288c70fe683f
SHA256da8853d1aade2e95b4ed8e12f27812514df7df413111d069b52a0089cf2518fa
SHA512e8405979735e9798afd96a3eb307914102034299ab0b4b1c0b973b7cbb774eb8d2496e3f3223017d379a90d4107ab80eab9205f55d5a4ee9b5a44dd28807aedb
-
Filesize
1KB
MD54baabe63ade8a8adcb061eedaf0b73ab
SHA166b61be57d40be5a0f16cfc60daa66a7b70bfb16
SHA256db38d6f16135d76b8ac34cc395f49280d848727f0610c809a0a7c32b775ec85a
SHA512eda756d56dc1d5ca74051074c738f0c24c3e618ca1cff11b0ce88332df3a2539a64c635b429501e5f64e34df7a95261c71581f724e139b0aac7ffdb3e800ba6e
-
Filesize
6KB
MD514be9f7059cd7f02cd4e862e2d3e9dc7
SHA1e8274165a95243124fd0bb218d615f60a5544b26
SHA25658b2611f79b18eaafaac3dda7ad8014107995800cafd5670eed8d624c07adcc1
SHA5129cdc2e9696c50ecfef296afd61e74cee1276d34b1616ff1babfe9ecf32c4d9f9cba46da76156dfe1f054b0f5edf00dea8cf73e3aebb358cf00d82d07106591e0
-
Filesize
6KB
MD5dc7f3b11ae16b52b42c633490a58e02c
SHA146f42e6d28330b624c0a5b02bb986d0ba2568c95
SHA256db6985468c7d01437a38c2835d729d4a851c99df7eadc6cd33b2293fccafa210
SHA51288c0a73c361d1f47550a7f473d28265f1dbec2f813da42888314a10aad8b0af2fbeaa346a8d76ce25d215d53e48ef1b6c3695d986879439df8388e92349d24cf
-
Filesize
5KB
MD59e57620583c24d345ebf95fff0416562
SHA155a04dfca8b1bda12bb0e58dcd119385c5ada24f
SHA25616fef3ea3a361308b7d72619ce5563a66277ecda469067a785422688e32c3e06
SHA51299d6b45bf020f73a3b8913fbd775ea6863f9fdd130941f2f4ce2c49b4d80e88d2df8b86cc37f34378f5eac386df23d51f17a80beb11bd354b5889ae391f29351
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c791c215519c761f1bf636c225e88e2c
SHA17264c8e8e67c44e573b730e56b9f83cdf70a85f5
SHA2564ad088e83277e547f10fa9b526bb28476c02a5ec934e8f2cfc60f8a1a1d169b0
SHA512ace4d4bcb2700db0230795b0c7958a6e3c4f2db547b7f7aaa75acc6b395ecd21056d3e1c8619ea0fa6c0491c274f4e2c289b90318217ae1401e2de3f33738f6c