Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
a0c1de7407a65cc0917c1fbbb1437909_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a0c1de7407a65cc0917c1fbbb1437909_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a0c1de7407a65cc0917c1fbbb1437909_JaffaCakes118.html
-
Size
45KB
-
MD5
a0c1de7407a65cc0917c1fbbb1437909
-
SHA1
1d474677a9c1b3b50fbdaae8b3f246200a197b7f
-
SHA256
1088984d71b1417efc1c6f9288d84480f25a3c4c19c4c8bdea5dc1940ce07f27
-
SHA512
e901ef9c2c3d07e44b87af397a56ff3c2c74398f1e966e69775f1ed5d14fd2191cdd8da2d33f5b1b8ec3accd940190011ba037af8bc9b0a13006c36963444df9
-
SSDEEP
768:SiQiNcOvU02XyHKcc2HfeaiDktVzlU6d6eWmLpH:SiQUcOvU0+yHjc2HfeaiDktVzlU6doml
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 4480 msedge.exe 4480 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 872 4480 msedge.exe 80 PID 4480 wrote to memory of 872 4480 msedge.exe 80 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 2068 4480 msedge.exe 81 PID 4480 wrote to memory of 3500 4480 msedge.exe 82 PID 4480 wrote to memory of 3500 4480 msedge.exe 82 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83 PID 4480 wrote to memory of 3388 4480 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a0c1de7407a65cc0917c1fbbb1437909_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9904646f8,0x7ff990464708,0x7ff9904647182⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 /prefetch:82⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,6413180223000278104,16200713606976756541,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5a58e47974fb4172d6e9beb6dd196814c
SHA199252f21e095d6892540d8c44e45fbe8764c0f76
SHA25662e9e7031fa26d6047533748768588592a31b1877d27d165b6e58d739715f761
SHA512c9323fa611943edece0d395b0a0f9cb8a5eedf7c5cea115b7e3364bf8357e0fa3af003954ff95d9ef621bfaab4d6f8c2ed020271a897853e0de4492fe4e411e8
-
Filesize
6KB
MD52022a6591d69c559bc6fa7b4f4ad085a
SHA1b67d9e351033be00dbca579868fffe47d17283ec
SHA25616db3fbcb10c03ed71972abaa5ced049ef6e6293db10f446a86f8832240ab8af
SHA512cd46b5e4a6fbcf437d091b294b1e42390c64bb4a06a5d1391529ec54c26ab60eda290b1de272c81f1cf141dbd8570265064c6c1286adb9caa26cfca3261f3519
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5e9bee6f77f81014d552781771a308f58
SHA1b52a055a6c7ee849a4cf151f5d6fbe799c05b8b4
SHA256c0b9066df85ed9f23d19bbb4100e96bfc5e37137f3c8d59f09b9e28f1d2fc562
SHA5128bd1e76e83faadecf8457d6cb9b19f26121198300951ce141ba92b55a03d5ea70d1dd783b1dd908ffc0de60696fa903ea79a51e299ab2f34481df929487bc7f8