Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
a0094c699afbb0807acce52b391eef8d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0094c699afbb0807acce52b391eef8d_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a0094c699afbb0807acce52b391eef8d_JaffaCakes118.html
-
Size
64KB
-
MD5
a0094c699afbb0807acce52b391eef8d
-
SHA1
6dbae82897a0e0405d0484caae4d0b6ee411f5a2
-
SHA256
2663d599cc03923a482027497178eff817bab942cc833d67a6a141019482a339
-
SHA512
ee613e7689f3ff00c6f922e571ba4b7c790f9ee073993aa5c0106e4f9e87d7966aef408825f589f0da04b80daffde0751cc9bebf20341ab07bf4658db2944e6d
-
SSDEEP
384:HQ/sPPP+h4JlLDSpbiF1JvmP2DHIskDln+5udtaN7subADyfntwewX4cjfekgLw:f7LubiFPvmAeQD7ayfme5cfgk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3860 msedge.exe 3860 msedge.exe 3944 msedge.exe 3944 msedge.exe 3424 identity_helper.exe 3424 identity_helper.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe 3944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 4852 3944 msedge.exe 79 PID 3944 wrote to memory of 4852 3944 msedge.exe 79 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 4024 3944 msedge.exe 80 PID 3944 wrote to memory of 3860 3944 msedge.exe 81 PID 3944 wrote to memory of 3860 3944 msedge.exe 81 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82 PID 3944 wrote to memory of 1276 3944 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a0094c699afbb0807acce52b391eef8d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe197b46f8,0x7ffe197b4708,0x7ffe197b47182⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15251361213801518920,11465451898899963470,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3b07cf25-2e0b-4681-a4fa-a051c888d2d8.tmp
Filesize6KB
MD581d8a7e4ada5db900da0ead91db1418e
SHA14ed9640fa99b4cd1589c05a7059e9e6a7ce92470
SHA256459feebdf8789686dafd372993449b0ad23b98529da14ef2d8d77e1120c54562
SHA512d7de410f3029aad5c64d698626e3085ea21c8143e68e46c7786cf727c6cc8086c37fe14dee39084260aff7a945583be0f20cf07f3c4689b01685e6c6c39c4d39
-
Filesize
6KB
MD56ea9ade93d4fd6a38e5208dba2a63b2a
SHA100f122a7bb0c1971e89ea0b0c0bc8f8c92d4796c
SHA256201648dd7316793d91e4bfb9163f4ad1dc653314a07b178184ef57027e804e2f
SHA5128d529a3f6d7428943337e23e5e94a8e21ab3b8801c9a8b30291b7894d2a2499ff60585c2a7f9e36ca60639a65a122d2fcd0509416971ea342763f94f2077303a
-
Filesize
6KB
MD50a0a29f7f1828bf776558c88ba9c6924
SHA1430c268e9fd004084a29603a2a4869119008883f
SHA256319ae1c6dfe6c0c6de4846b25805a2b6ca8853bb6aa6b249157e49a511343925
SHA512d7c7acbda7fb6ede9b612160182e9bc9fbd4da1f3623f8c002964b7fd3f09b2ba09a06fec7e5d5c05913f7cf68a61a3b4696f1b2d9a550f684336243426bf4ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD524f4701955a44706e61aad178f4848a5
SHA14267b8b9be4e0b04461a69d3a8ce7a9162df0593
SHA256cd8222997bc63ccb0087df8e23fd094b6ced14691c4b6869619d23fdb5419386
SHA512ef7b3596f8b71e8cb26264525446bf99ef9268279b7cbb1754da980984691f52fd6997b2f429df47c90b87427a74ae2ce33f696c94373004578b9ea66ec06125