Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
b0ccd6cd3dfa3d634ad9594fc2493ad5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b0ccd6cd3dfa3d634ad9594fc2493ad5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b0ccd6cd3dfa3d634ad9594fc2493ad5_JaffaCakes118.html
-
Size
71KB
-
MD5
b0ccd6cd3dfa3d634ad9594fc2493ad5
-
SHA1
63d472af9f7ea84b61a209a9d47cd80ee10014af
-
SHA256
c4997fdabb4a11b7cf3a4301d311526c67d7c4be76776a2428f23c40331ec578
-
SHA512
603d072a980710f3dd6cf35d6d1deba71cf2b5e2ae055f2a15e55f4663beef12e7d1612a077e878fd014a4e0f5ff929baaef503bfbf34b4b5b82fe3086270f94
-
SSDEEP
1536:NWkADkAZckABKQbZkAXhTcr0IPGNMxZPdJXxPTQakAm+S7vFSipwyMrQmmJcn9Wq:wkADkAikAIGZkARTcr0uGNMxZPdJXxPf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 3412 msedge.exe 3412 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3412 wrote to memory of 704 3412 msedge.exe 86 PID 3412 wrote to memory of 704 3412 msedge.exe 86 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 2492 3412 msedge.exe 87 PID 3412 wrote to memory of 1452 3412 msedge.exe 88 PID 3412 wrote to memory of 1452 3412 msedge.exe 88 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89 PID 3412 wrote to memory of 4972 3412 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b0ccd6cd3dfa3d634ad9594fc2493ad5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b7446f8,0x7ff82b744708,0x7ff82b7447182⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14578218610823358865,8814700699942851658,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14578218610823358865,8814700699942851658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14578218610823358865,8814700699942851658,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14578218610823358865,8814700699942851658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14578218610823358865,8814700699942851658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14578218610823358865,8814700699942851658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14578218610823358865,8814700699942851658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14578218610823358865,8814700699942851658,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5cffdb34bd66899a434c316dcb235f202
SHA1e0a75468917a91087f065bb71e11350593a31224
SHA2564b0def3311c945cc84bd3828ff7925bb1f3b403682451aabef35df620ef241b8
SHA512caa62faa4d9857e149b47af2ea4e7c26f2adc9393c50f28a8c376eeed07462a9bb8a95376ae4e56fb85927a167fcf5789956ad233845c51c7fc912538ecdfc13
-
Filesize
2KB
MD5f5febf2f666f3a2ae157d225c476b416
SHA1fa75eecb971d4c698348675f659fa99ce07e14d2
SHA256c0ee865ebf255541ed8e48d2e2fe0e95585d627145fb9e8ac891e1e7373b755e
SHA51270673adfdcee27b4be79533e571c6e8a394c481f7790d09c61ed4104a551f60e2faa22871353c2c2c08510eba97fbb767a7faa47c3b830546293633781719d15
-
Filesize
2KB
MD5aab60c560c4cca7e394e9faae7c17dc8
SHA1c54aa8f6e0a1f5ad12f1778ca697a2f103da357b
SHA2569df9ed1c38a92023a134f12b5186bc928a3ef9662bc6fb15b09aec8565bf1798
SHA5129d19f7cdaa446c78a7052e3be4cd6c5c6cd3e791befb88ba4ad6e505e001cddd290a202daaecb9aeae14f8098f0d9020f1e8a00994154a6e90ead39522fc06ba
-
Filesize
7KB
MD56770500091f24a14c614488bd62ee0ef
SHA155593eedd55d7aee2a9797c1469b34b081614b54
SHA256a42e7a4181b4bb01303171d0864a3c26a1362e5fc10d31ffe35fc62451c14be4
SHA5128cda40f6a0ab0425c1d3f338c1cf1e0c7c0a39f5eccb8118e2b05112630dd4c0f3df644a2641651739ada6ba4ea2d9bed688e613d492a1e03fb2891ecf6413de
-
Filesize
6KB
MD55018d7f0b7367bdb1ed4794f6d165c01
SHA192bb7212f5d4644aa18544467ebab794a2a9c343
SHA256b19e398fa3af22e24e92730274c10891f3fdafc3efe5a70df7e087f9cd8258b0
SHA5124945cb57527aaeb0d43b9f5c9396ae660abc43275f383237c30540ce252221e3ae0215cd1363c00c2ca6d66dfd2fbeebff4a15fdca5306eb61c1c68ac0137f17
-
Filesize
11KB
MD5499ff82dd30e84c55f0dcdb1e00b69b4
SHA12c06a356d396b251d30a3834ec56ed9479192a0b
SHA256226021029015aac9ec57545f2cec604cac7a59cbf0bbf6aecec244b2d45d7ab2
SHA512c82fadc2549d62899aa178a210fe8d485c33521eaca8fc830b8b833199da18802de2f392d7fff6db5b30ac398593fe8449bc3aeaec1a4f21332f5101c0e7746b