Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 00:09
Static task
static1
Behavioral task
behavioral1
Sample
0b7113a9aff21c447e2acc6e6cc69f95_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0b7113a9aff21c447e2acc6e6cc69f95_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0b7113a9aff21c447e2acc6e6cc69f95_JaffaCakes118.html
-
Size
124KB
-
MD5
0b7113a9aff21c447e2acc6e6cc69f95
-
SHA1
27a1d2d55fbe8d389511a0aa5ffcd571e585c789
-
SHA256
342da88f530b1ea593d58daf633fa9cbbbde8b3f3bc5786f6ceb08db6a6feb3c
-
SHA512
82f9709846e67cf901e2b4205bf14eabb42363450dec684f72718437ffc8397a7ed4821f51782521b910bf7219d34c4781b6afb3a56276774141853f45bbf177
-
SSDEEP
768:ox6+5c6Y+7v0QgpRJCevmw7CtRJCe+hRKCKn4XgAZdVU6C+UFjFAbzoCE3zmp3Gp:o0Yc65mp3d7Ctv+hH+4nOKvE3SS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 3084 msedge.exe 3084 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe 3084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4468 3084 msedge.exe 82 PID 3084 wrote to memory of 4468 3084 msedge.exe 82 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 5060 3084 msedge.exe 83 PID 3084 wrote to memory of 4916 3084 msedge.exe 84 PID 3084 wrote to memory of 4916 3084 msedge.exe 84 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85 PID 3084 wrote to memory of 744 3084 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0b7113a9aff21c447e2acc6e6cc69f95_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb10c746f8,0x7ffb10c74708,0x7ffb10c747182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9008951841874575403,13345340845627226458,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD57570389574eac693dde3d84165c62e7d
SHA1bfb1806c9a4d8adee50df87c8d13896041f564e9
SHA256b566054376cd0cee2731e16f5b61b87968b846dea321bf667460d3d4ebf5e008
SHA512c2325116a425eea6dc6b00952d10026d27e142e258115fa13c074c39b8e33b2db315135d2925d750343052151ac540a9f916998fc9d039f6cabe18146da6e43c
-
Filesize
6KB
MD56ad040732517d125c16f47dfd8a44525
SHA186e16964c258eed4e21da390693e6bf119adcd26
SHA2562fbc4674119c6a8e040f15aca2f6ae12c7a435564e28c15b32ba37e8cbec94e8
SHA5124bceaf2299decc9bf40f092b52cb95fb11432a202c21ea7ed50f602082bd2d4df1141e172624a2ac9e87645a1403acf88f103be4cdecc6a37237e42c9332294f
-
Filesize
11KB
MD52a8a39ebc73722738e403881ead52e23
SHA18a1ba67c4946930dd52d2123ccc4eaf2a574a790
SHA2564ad76e5a126d073a039ef61ab9589a4f13a64a140356747deef8e134148f5cc9
SHA512d21fcc129e215f7f087df748cf080f1a6a07ef3977521a2c6a1e673b0cdb5828145b2f3a2f35b03e1e0e62ec6361cb4dad358e891a145b2ecc848bb70f025667