Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
0fc9aa5fc9d5f04326d80aac8c9bca04_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0fc9aa5fc9d5f04326d80aac8c9bca04_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0fc9aa5fc9d5f04326d80aac8c9bca04_JaffaCakes118.html
-
Size
195KB
-
MD5
0fc9aa5fc9d5f04326d80aac8c9bca04
-
SHA1
5ee7c479139df0b99a91843a77f9a456da15fac9
-
SHA256
30e0833839fd2abdef7f32d46711520838ab1873a6b9d172cb9322782f3b06b6
-
SHA512
784c76eec857b488a98641912c6b53b04efacbb43f8e254b65a8a83e8bf9920924fe0ba6d75ff661f369fc2e847c29dd1be874a37a912e42355266c439d5079a
-
SSDEEP
6144:/REijZeqLbEijZeqLqdxjdu5HTzM5OvTq9ggILykKXIL9U2C6Th8HF9pRHGbtgaq:/REijZeqLbEijZeqLwxjdu5HTzM5OvTY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 1676 msedge.exe 1676 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2948 1676 msedge.exe 84 PID 1676 wrote to memory of 2948 1676 msedge.exe 84 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 2292 1676 msedge.exe 85 PID 1676 wrote to memory of 4132 1676 msedge.exe 86 PID 1676 wrote to memory of 4132 1676 msedge.exe 86 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87 PID 1676 wrote to memory of 3484 1676 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0fc9aa5fc9d5f04326d80aac8c9bca04_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8ba346f8,0x7fff8ba34708,0x7fff8ba347182⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14042136856037407688,4413516072380980526,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5400 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5f02a8baf7792300bf644a30c3a7da671
SHA12d4e9ee07b1d1c63a5d323acf60811bcc5554bd3
SHA2568841432ac76d1983033d28647e805876490c77d96d3919961adebba13769b375
SHA512e7e91635ba48f187c2a3e90eb4d054367efb0947e561a38273838eb78825f77e3801e73a1dc226a01bae66b655de16448a24d9b4306e0eace350651e306f3786
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD59d4b17670436a33742fbfd99b2cb3941
SHA18da7f553e08e492d629b3e3dfe5fca694620a23a
SHA25678b696a2b05bf8d18c5658ffddd0cf27558f68f0990512c18a3caf010b2e4896
SHA5124e3ef23420bee617cdb56d264ba39021b5e9f7e976f5987a67f23c1af0d02ec857c8e0dc9e4bf4048345068feceac37bc7815658edbcd778e6ee38fbd7cb43a0
-
Filesize
3KB
MD550a8903e81d1165305bd659da4c39a32
SHA136f3668af4b58b1e484a4ef388743baa8902d4ed
SHA25674a306fdaf400ec9ce4a64e508a63498c787d91cbb8a4642dd1e35e1af11e811
SHA512e233906993790c06e777db4f42ad5f745ad5de60e1ff16d51186d3f53fa0ebb89e6b17f36b1b2391a75ba7d2a09f5544e216bd1f8b6cd9fea673415533211388
-
Filesize
5KB
MD5542915d2c2bd0ac45b188488e860bf95
SHA1e927c17dda42350637f6fc31988d79bde9ad82c2
SHA25685405fb908902673802ac4ab6d28c6552d0397a8b06c11a4033667fe7d6c4a6d
SHA5120292325681636e6f52b9dada7b3c28d1cd3db6e8ec1d179e1fc349703ecac6de22b57d0f97c574f8070176f38ef4d3a9a7692ef2ff1cd40ab56295393065d095
-
Filesize
7KB
MD5a364dd9ab3462525351745872f3d19ac
SHA1919e2b5303195e69342084ce55c6b664da96483f
SHA256901f61586eeb6c46c98bbe61363595401205ea4f4a01a9f1f3db294ce4137a43
SHA512a67e984441aa12a474e36fc309809c913d666737d98f099285b67bc826f9d09977e24ae3653128bb1bcae6c464b32c34f5dbe24f85af70c9021e93355f59c98f
-
Filesize
7KB
MD58275153e149600e26735f4476d91f18c
SHA12c1f6f6b2cf47910b5de97650034e4ff6502794a
SHA2561340014adfa99aad254218c342d35ea713f20a6f0eeb7d1f2db36acfdbf3e35d
SHA512c92fc6c14ce248e9678a06ac78789f3933a918fca922dc89eb0bdfa928718e4da1a4fd15840e0d26ff4b0383bd284868165f03f103027ac8934d6cf17d773309
-
Filesize
11KB
MD5cd289a4af3aa0ef16c093cdca4e62d6a
SHA1bb93a790d835328df50a9a0d75fa00786bbf93b9
SHA2562a99f8065980a3fcb08a912054989359bc1a6cbe0a8365840739aae014f13069
SHA5127538b1e5f7ad9ba8a841c7201dac598dfed0fabe6d248b2388fcf0f363ac829d45ba73be60a7bbffce3269858e84541dce5d5d1d7a9a017569961df482aa790d