Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
09cc96c6dbba14609e9677e9d4273685_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
09cc96c6dbba14609e9677e9d4273685_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
09cc96c6dbba14609e9677e9d4273685_JaffaCakes118.html
-
Size
57KB
-
MD5
09cc96c6dbba14609e9677e9d4273685
-
SHA1
a0e313aadc5a96ebecf37a6c0dadd73c22a4fada
-
SHA256
ccd054a1e85b9b1b380bd0b760f1014be89133d284f544a5a231d132fa03f91c
-
SHA512
7e52e43ef977b35e8a3a1becca39c962a25df5c0b61d550a89a531dae120bc5bab3fb06c431e80e7c67ac4a67beba3c9384e6f9bc0097b52427113498fdbd603
-
SSDEEP
1536:ijEQvK8OPHdyAOo2vgyHJv0owbd6zKD6CDK2RVro11wpDK2RVy:ijnOPHdyQ2vgyHJutDK2RVro11wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 220 msedge.exe 220 msedge.exe 4344 identity_helper.exe 4344 identity_helper.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 2564 220 msedge.exe 85 PID 220 wrote to memory of 2564 220 msedge.exe 85 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 412 220 msedge.exe 86 PID 220 wrote to memory of 1736 220 msedge.exe 87 PID 220 wrote to memory of 1736 220 msedge.exe 87 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88 PID 220 wrote to memory of 4112 220 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09cc96c6dbba14609e9677e9d4273685_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb32ac46f8,0x7ffb32ac4708,0x7ffb32ac47182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10271000891338275232,4458356953649351248,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD564823d5e5b0d219885458d88d33f6117
SHA17a8c3135776741d68d0be7bc83602750a35180a8
SHA256a85c867a0c9ba7cfd32e25c82c3b4c9e092be7ccaf293df559a94ad2e570612f
SHA512e7828ccac2dcdf52b480ca2a5265c5d25104c4a999cb9a019188c893b621a4d2159dc71ff5682d6a27474c1ae23608778501ee53cb87e4259381a50e25926c81
-
Filesize
1KB
MD5633c8ff7d5f57b07e4f2cea9e66df82f
SHA1e36dc4b34c5887292b06b74e82d224951eac99fc
SHA256a6166bcb9846399fb5b8bc0ee0c5b78a6172b186b6fa6722b5f1990ec6fc419d
SHA5126fce303ddcf8424625f44451e92a2bbc49a3b628661e737b0a37f89c9eab766c2cd0af8b712a8bd0670d7e13339bbe60d3eb3bfd39b000cc019e820dbc8a16a9
-
Filesize
5KB
MD5ee693dc5cbc053326276db41cf9354e1
SHA109281b1fadcaab7e1cf87197cbd337f0e2772753
SHA2562be02ab6c3a81314261ae6ba7d529bc5640e4a0b9b82f3ad2a42ffcdcb1a9831
SHA5129845adf78af8af6b474bf3bbc5fb97e7d263ef4fd6c0aa4f6aa5cf08d14933d05295629b8946d2a1933e441e3c80f111351da984ebee2fcae9827c5afeea7077
-
Filesize
6KB
MD55a10f192f87a5fdbb06666b19632457a
SHA18591bcead3666b50dc9667e790be1ab641fab5ed
SHA256ea251371ebc66bd6ca927eed045c3d5c234d0fa3c3893ac0ce6454175c51a38c
SHA51255e198e4efa5407ea8e2971fd23f682dbec4352e18eddbc14c624f71603b015e4e516068021b2872a25984c6bf9437ca136162d33c2681cba6bdcf72e3116424
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD53074fb1933af4eaa234d53b8459ade7f
SHA161385c7a6133805f7eebe6d00f09c510cd7fd0d7
SHA25625097f4eb0fe65d319bf66c0abbcb24125f374c0cbcdde6f0a0823f61247539f
SHA51230e89f56ffe5fa87fd1d6313a3dbb9cbf31dea613374606dc1f67d6d3dad39238989aa8ac01c1ee9dcd3ced9b630798a171e1ffe688495cb0674217f7514f3d3