Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
0d2fb27792e832b716b2f683bd8c3dd3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d2fb27792e832b716b2f683bd8c3dd3_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0d2fb27792e832b716b2f683bd8c3dd3_JaffaCakes118.html
-
Size
176KB
-
MD5
0d2fb27792e832b716b2f683bd8c3dd3
-
SHA1
8e7bce998cdec5293f72c31f23d8b4eeba6ecd30
-
SHA256
1208b48fb56f4fc2f005af67f33ff4d73db831d148718795e880f9a5bf9beb33
-
SHA512
ef480bbd2196444cd9133bb15838ac1715fe03178ff384c827cd00e1a33926b98043700f7aa446d0ddaacb345347c8028838ddb6f85b8878081cbd0b2abe2370
-
SSDEEP
3072:8N8TvAU6U8GErvR2/Sw5/2Heqkx/5NPzGMGaG0Zv6Islihgd6RLs+tG/SkGzGqGF:MYSw5/2Heqkx/5NPazV0Zv0OvQ2alBCi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 4472 msedge.exe 4472 msedge.exe 2580 identity_helper.exe 2580 identity_helper.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 1304 4472 msedge.exe 84 PID 4472 wrote to memory of 1304 4472 msedge.exe 84 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 1000 4472 msedge.exe 85 PID 4472 wrote to memory of 3012 4472 msedge.exe 86 PID 4472 wrote to memory of 3012 4472 msedge.exe 86 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87 PID 4472 wrote to memory of 3988 4472 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d2fb27792e832b716b2f683bd8c3dd3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa993e46f8,0x7ffa993e4708,0x7ffa993e47182⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4212 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,10205863367665919720,16823545248314435448,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5775c7ccbaef6dee44d89474036781e5e
SHA171a4e6f5f0bf4742dc722ff0d3e40196755c1004
SHA2566d11d12b14cf5ff45de984d149a665de6815ba62cb4c1830af57b7959434b9c4
SHA512a6d6cdd6bcdd293b85382bad6948c94e01dd3d7aa6bb9fc1820889f0c1af051764485c08ae10310605a52ae090aa37f9b6ef317d8b9617d1a65261b732fc6365
-
Filesize
1018B
MD5d64a8146042e6f867de605d0fc248e78
SHA1bfe161043dcebe61bc6a8fb4abc0805bb8db7523
SHA2565f473c25d8ac539785ccc86627e3fbf7678f94f28cef6208419931434bc60ae2
SHA51262ce2c93b202b466a5fa61d77a40b92d4fbc417d76fea9d49e16d0a3ac874225313e9531b2f71e2d3f1258da820357f970e89bd8a9ab311f151056769c8cb022
-
Filesize
6KB
MD510c8ec88e2ae4ef5472b2bc9e3505697
SHA1c76c79a1a1d54fcbc00d103a67bb6711aa74e6f9
SHA256354474235d844ca7186b6608c54db04fddb24fe57549be02d45f424592bb867b
SHA51211ed140acbb6f86bbb74fa4253b85cf1c1c0e759c4bbc8d9c3983eca72133ab659318a82c34642becc9ab47a3cc0f0a84dd3b42a4bf44dd81af849b41a34b02c
-
Filesize
5KB
MD5143b8254b46275ee8b15dc9b076f6696
SHA14b0e59a27a985877fc055a569d1a06f4309f207a
SHA2564eb05af2ca0fc6bf0fad4fd1792eeb911a97bfe73d887556121bfd5f7ad44b6d
SHA51269f3c439685c35ae6215e40671427e677b19af6676fe5a9f484ba3ace2733b662086dad3c6b6f52e48df8c21efdedb512c7e3d16f5904b48e9850bc85910c484
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51205b30023f8a3a18fa53497ab949622
SHA1610fc3a26019b9dc5b46539a59d8dbca9a59fcd2
SHA2566aa1533df0e9539f6c059cd741a12bbce35fb3a19f47fdad00a39df90ee8bbc7
SHA5125be0c2dc0e87bf17b0cb1fdb7358e74216f958e642441354edc261b53eb42360822367025856ba6ac73f66d320f2c243faaa9dfc0a76cdefb7fbc9cb21bd432e