Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
0f776051dbec1efa929991d9cf27e504_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f776051dbec1efa929991d9cf27e504_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0f776051dbec1efa929991d9cf27e504_JaffaCakes118.html
-
Size
45KB
-
MD5
0f776051dbec1efa929991d9cf27e504
-
SHA1
6b2e0e1ecdebd3bc68d83c2492cc02a1b23c34f9
-
SHA256
a5f2117f120543ce2b17d2d05497de01c20486b49207020e8aa38c2d19aa6e4e
-
SHA512
ebac991b962b1b6548f7244b6afde86c0a155dc3131126c31aa8b9e272e0a5b64b2e8848874f97bd372870984258458a1c710378956e481bc418c3124f77b9ea
-
SSDEEP
384:xQMIxxx4di0NCLCYGxaWhib8TwEh+dgCgLiwKgSHfp9YosS3knyh+ikS3wnDc+UT:xQlxeE8/+dgCgLiwKgSHR9hkny0+wn9A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 4416 msedge.exe 4416 msedge.exe 4644 identity_helper.exe 4644 identity_helper.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3056 4416 msedge.exe 83 PID 4416 wrote to memory of 3056 4416 msedge.exe 83 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 3208 4416 msedge.exe 84 PID 4416 wrote to memory of 1140 4416 msedge.exe 85 PID 4416 wrote to memory of 1140 4416 msedge.exe 85 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86 PID 4416 wrote to memory of 976 4416 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0f776051dbec1efa929991d9cf27e504_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a5b546f8,0x7ff8a5b54708,0x7ff8a5b547182⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,15093886524919097839,4424822810348531871,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
184B
MD545996eb12c5b1a531a2d9a3f56b913ff
SHA1c61935c0ab773fc8ca70f30b06620bd6e304c092
SHA2569f1f531b5d1eb3c957e2a57f0d59533bd7bb5da6f59e230b70b1e942e6dcca33
SHA51206455d33c060be6c22db298dfd4585f15d853d471e7ebee67e35c7fd2526261e400ca536cc3e3b3acf32175ea3b8ed41ee1c0e5bd3fa811e0217d1a078af42da
-
Filesize
6KB
MD5305d6d872aaaa973c9d566bfb997db39
SHA1017428aaa4ce0e40293d8c824c728cd0cd3e1f21
SHA256c4f005ed9ad0eec550e46b02f28e271953a90d55a4b3ec3206b8ad5f9322fe4a
SHA512f98552fb6f3d83e13eb7f7662f1def314d3d565124754a3c4047349b45ffd41f00fc54a92f8bde7d5f33a4bf77bf88dcdc3fd829a0391e005cc08ffdf07f1e86
-
Filesize
6KB
MD59563fafac5056230019d3c230a9c94bb
SHA13a4f98a21f1317a7886ee5a84b7cc76d3eddd1cd
SHA256f05a0b4e807e5ceca000318e8852caa02b70b575f66238fba3f2d667092394c8
SHA51283e0f0f1aff36493e9eee50417604645ff57cb3ef244891c7c9eb832d658fc901142e7b956628fd52cbc0af6281d1ecbb4ea29c62c742579a4a8be72e14bd00e
-
Filesize
5KB
MD5574ec4377ae97c23d3c454229a9c4b08
SHA1c31272548c4fe074e3834e6d4474d5025e255ab3
SHA256ddc569e33a94ddda2d266ec87be32ee463904314411d13cacd27345f37daf548
SHA512f35d3c9aec30a113eef4af7862f93dff2e0ff41c8eee65b14818f6d3aeca43b5a07fff5d7603142fd0ac3ae4ef9deb03305da777ff2fa309641a04ea89bdc60d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b734f5164f8d09c3d50944bd223ca6d0
SHA129512a5e43916f91faf65dfdc85368fdb024a23c
SHA25672675f3ab4b106f36d5348c44176c16ce16d00eb4e14ae4810c40dc3756c38f3
SHA5122e144b17bccdf8869d4b5d0ee961e06f80876ae338ab8ab6c1050f324fd5e09e4686f3eb920ca5101063ad61cc0116a3c298b1ab249559f38c31256372337bfe