Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
0f6f0d1c9c00f4a351db91f632a1b4f7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f6f0d1c9c00f4a351db91f632a1b4f7_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0f6f0d1c9c00f4a351db91f632a1b4f7_JaffaCakes118.html
-
Size
15KB
-
MD5
0f6f0d1c9c00f4a351db91f632a1b4f7
-
SHA1
38d66cfed20f2aa35663e6e7ce39998bc562a3b4
-
SHA256
db13d7c4fa8335b8682d0a7c3f585600d8787aa1f8c754056590a677866d243c
-
SHA512
7f5404bf76a40dd22de102d392c9591783faa26eb64a48e085b2c7a348500f1b77e53c6d5eddc9674038219b53d6c45991fb3db936abf2d23e49ef714057bd34
-
SSDEEP
384:pFc/hNX/ORF0M0URWB7qFlnaVZsotca22V:3c/hNPY0MvK7YdacoWaL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 3220 msedge.exe 3220 msedge.exe 3620 identity_helper.exe 3620 identity_helper.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 3940 3220 msedge.exe 83 PID 3220 wrote to memory of 3940 3220 msedge.exe 83 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 4200 3220 msedge.exe 84 PID 3220 wrote to memory of 2012 3220 msedge.exe 85 PID 3220 wrote to memory of 2012 3220 msedge.exe 85 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86 PID 3220 wrote to memory of 4420 3220 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0f6f0d1c9c00f4a351db91f632a1b4f7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe925646f8,0x7ffe92564708,0x7ffe925647182⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6296 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,8735074127430958615,17533389492665300409,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
204KB
MD5081c4aa5292d279891a28a6520fdc047
SHA1c3dbb6c15f3555487c7b327f4f62235ddb568b84
SHA25612cc87773068d1cd7105463287447561740be1cf4caefd563d0664da1f5f995f
SHA5129a78ec4c2709c9f1b7e12fd9105552b1b5a2b033507de0c876d9a55d31678e6b81cec20e01cf0a9e536b013cdb862816601a79ce0a2bb92cb860d267501c0b69
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5ddda1abd81fe350f7e09719ba600bc70
SHA11db9f7c6e53bc5e17aca2eba4b13c74d5bc7f795
SHA256b50f0effd88e4ada8681e654647437f147afee25dc4c78d01878b1c51cff8293
SHA5124953fa61eb78232a127d78007280c88a54bba7d08cb3db657aed63704708550145ad43479b84e2741028a7b2e252e3f955b31caea0857541b0029cd176fe75a0
-
Filesize
1KB
MD51404459c65087478a11135a2dad57c5e
SHA1004bf1f6a3ea5345d343e5e6585e7334037a0e8c
SHA2566a8bf29923bf7e523e5a922cd532491f4e726ee857a71467bca7372a6f9eb79c
SHA512ba618285f964bc4f01debad114b50bb94e37c69ab9682732addda257f5159cb967dd986b14cf5dc6c18fb2c53fde99c368d884b71c941e434f13eb5892b470a2
-
Filesize
5KB
MD52f759408b6460d4e4cdc72212dfa234b
SHA1762743a4b81d144875d4ba36ac4cb7bffc4f26ff
SHA2560d436bced42a97b6fb8e878ff37b387562ca343a743ebeae0e2b05ca7a3244a9
SHA512b36b061be6231d50cf9a2b73dbf22ffe4b698a21436e7ed251bf80080b8f77a51fc0a5a986b11881a4da623a8af1b4cab37e71490bfae8c32d1bce951f3511af
-
Filesize
6KB
MD5a728030549ede36675ae699df4e44319
SHA1f09af3cc165aaffddf98c8c590ecce9405063b73
SHA2564f439b8fee7370b27cb9113456ded8cf519d4011aba5657c3e5635eb2927bda8
SHA512c594b343d0625dd8f345a519ae2ab7b8f01d482511cea1bd4022cf6d364a8b42a2d6586f835918a92a21e6ee10617dd3fe5cc437e21d2724fa8794d88ef8e6dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52a81e6a1eba16e7b3e661d176542e3b1
SHA1f3facfa4d9fa796ffc54dbbe4d1da6a884d9d115
SHA256e46f8a6e3626c1f0f7e7a6ab475ee952e79ed1ac1876b8561796f0751352e801
SHA51270fa75b92a06bd75913753d313f3e56eec9aced9f3dcc17045cccbe6ffdc8bc03393384e9d60cb6776763403b50832e3f90c55ed6ff072bdc6c663bbe28235e0