Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
0c8df9b336fb7d2c8622d5df5c5a23fb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c8df9b336fb7d2c8622d5df5c5a23fb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0c8df9b336fb7d2c8622d5df5c5a23fb_JaffaCakes118.html
-
Size
87KB
-
MD5
0c8df9b336fb7d2c8622d5df5c5a23fb
-
SHA1
be6d2912dfe03a8a00241f9cc79b9652e02a1559
-
SHA256
cd5354c6bc5bf28fb877e0d28707b1a2bad2d71194e5530d1849ee44517aa458
-
SHA512
8230f680be916bce5ecff6f679970e6c8dd14c85beb726be3228cf4594031f130e6d727d57ab844a4226b035815a2038cdb62ac5a1ecf78b15f695f1477bb748
-
SSDEEP
1536:jC5g8ClL+XFT/5d9M1UoZthMxro1BVMd2oJ9EiMwoIMyoQMx+o1Y9Mxgo1Y3Mxvt:jDlL+p/j4FtCUBVvY+FYMwdSS+AaDtse
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3080 msedge.exe 3080 msedge.exe 3372 identity_helper.exe 3372 identity_helper.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe 3080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3080 wrote to memory of 5108 3080 msedge.exe 80 PID 3080 wrote to memory of 5108 3080 msedge.exe 80 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 2476 3080 msedge.exe 81 PID 3080 wrote to memory of 3984 3080 msedge.exe 82 PID 3080 wrote to memory of 3984 3080 msedge.exe 82 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83 PID 3080 wrote to memory of 2264 3080 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0c8df9b336fb7d2c8622d5df5c5a23fb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb533746f8,0x7ffb53374708,0x7ffb533747182⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,6387432232979816462,2074911902013776004,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD53dac018d083f99d9901b4f2b3dcba03b
SHA13f9a4c255c4bb90ca3eff470dea9282177ab5ed8
SHA256728e6589236b013dc792c0760c1b987a185d662ab37c4978dfe833f3dca1e575
SHA512973f382e5ae32e51587b85f81d7e5daf3960d35f22851b992100b293e944370ff88e135ee040a54e6dc7939104bcd8f0555f6a8cca94f0a17420d0d5eea95042
-
Filesize
6KB
MD507975b3bfc6c6648a2be21cfad884072
SHA1125889d3356b90bf65b119f543457c183769a2a9
SHA256108bf202732f0e98e23e0caf46ab404a656f9bc83820b671dae42649706a8221
SHA512e21ce9d273a2340e6b17987f438570d2527acb33bfefa61b42cc7989c04b573513d02a38b97de3cba0373a219a056f3f6f3f6b136f4063939f7cd04e6da063c4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5fa275cd89e29601018c0bc3705f398eb
SHA1cd848901e7a1d4f76640cdb6bfa675d2aa26e7f0
SHA25649f36e42d31cedc881bb17019189656494d1412e5a9779295a505fe3d63cc88c
SHA5120e9a5db57a8c6563560c45ce27d08bd2ac72b19c81e2cf97aa51e8aa9c96a157df965c4c666caf34fadf296fb67c556efa03923fbcc25173ad00676326d26d90