Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
0fdf7ce56f43f071505dba7f9d1bc56a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0fdf7ce56f43f071505dba7f9d1bc56a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0fdf7ce56f43f071505dba7f9d1bc56a_JaffaCakes118.html
-
Size
56KB
-
MD5
0fdf7ce56f43f071505dba7f9d1bc56a
-
SHA1
df76cd4800e5f3bb074ec5977e1155a48348cdd2
-
SHA256
bf2094c3972b5dac38593e65e3bcc58af182bc2e4a47ef9f4564a655bd0ffd9e
-
SHA512
3ca3e79fb4cb36e5fdd785ba7a5b263fb584661512aa597fd525f89060383ef39dcb2ef41622ea06b35dc8c69569e67569b82fd3ac8740d47bbac7f82072cef2
-
SSDEEP
1536:I9/YW/HJ2XYRcxvcrabdYzf+VDXRU6M2jO/C1LF5:I6W/HJ2XYRcxvcrabdYzf+VrRzjxLF5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2452 msedge.exe 2452 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 3996 2452 msedge.exe 83 PID 2452 wrote to memory of 3996 2452 msedge.exe 83 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 1924 2452 msedge.exe 84 PID 2452 wrote to memory of 2664 2452 msedge.exe 85 PID 2452 wrote to memory of 2664 2452 msedge.exe 85 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86 PID 2452 wrote to memory of 3180 2452 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0fdf7ce56f43f071505dba7f9d1bc56a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc840f46f8,0x7ffc840f4708,0x7ffc840f47182⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9297202474991624409,11414266321923733398,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5f264a019c731f658bfa74e062ac3f384
SHA11c01e98191281f7d92fa95dae85b3aebe905d60d
SHA256096b8e32681a04a819845e4e555961f82615f553bcf77ac91e5b5f87266cf301
SHA5121fc0bc965b9b888a82b199969ab70b57d64e4b0e53a8ae3146ec67fa1249e05e8998c8a9f44a23c1564a0088344e7cfd77d94804aa6abc8364d270a49f6b4296
-
Filesize
1KB
MD577959c1b35f4380b6cbb96edc47c0831
SHA1c7267cf443e24f405eba18a013482c68d54837dd
SHA2566c9951d0d502368af4f1309a71eac97f658a9e91634add8f15ac6e852ad56225
SHA51271d238202696622766870cd57825702126100321b4446445e19e438e59b17b01b28e1292a00240f2dcfb43fac8e1251546edd1c742906298c5cfbb5784fccf67
-
Filesize
7KB
MD51509be2a8321c12b9280d866e5066622
SHA129557fc43e0ea1b5d23c1f43e260ed118f81dce7
SHA256c360f0351fe983956ccbf3d292d239a1485de4a4da6ea73cc4f7a671fcc68268
SHA512fa121f6ff3da1c4289c7d311ee1643d93d7a9cdd44596696ff0df88dc5cd7e806077acb11eab164d312a039d29b4cb5f6629f5d4ed1626010783439aea1e2e44
-
Filesize
6KB
MD57bef015ee1e42cd14659d3236fb26f0c
SHA116373110c337b7b96d79ff8f575ba302c4034b0c
SHA256fd598af0f28ad19a5635cb4ae82ec27b331e10cbf04e2628ac3f95951b658356
SHA5120faee6da2686b2146fe655b3a79cfab7e2f46ae3d9c5f02a037dfedf309da33b0a41da2d15525d1681b4837151dda1057c95b0fee769015a80f95619604b563b
-
Filesize
7KB
MD586607a87e4c01c1d9d8691705f4579d6
SHA1290d5cdd9f94acb43aeef5009d510e2e121ed7dd
SHA256e7591af7e204d59813ba8b534dc7c072c521717b2f589051d0e8951fe5a2fb62
SHA5125ec08933103cf0d0be2556999af027bc6899fb37f82d290d9ed991926b0311952ce30e53f9bf7d50121abd193d287b664033afde161014a7eed1b38530f5032e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c60ec42cf71132adf70d79fc4a691d47
SHA1398aaae89160d99bc21a038ee87a9ea25b053829
SHA256c5f6babb44bc0225ae676d8aeaa5b5bf9480a3e86f0b838da49709b67b91350e
SHA5124d73c108b8c1ef65f76d4a88d8292e1d5f45a026efb2e7fe07efcde2f521c87172250759ddf1193c43aded1c722354bd2fac022f74a2479c629b0ecc2d63fd56