Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
0c9098247581d7efba77e41a20bfe997_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0c9098247581d7efba77e41a20bfe997_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0c9098247581d7efba77e41a20bfe997_JaffaCakes118.html
-
Size
28KB
-
MD5
0c9098247581d7efba77e41a20bfe997
-
SHA1
0ae0c0922814d98c16772acb614a5aaf8f43126d
-
SHA256
2b3ad5c0a42789b22afec288c98307b75eb425cdbdde27ca5f4060521efab1ca
-
SHA512
862650ffcd9d4d5571b64c38c9dc46c47f3128722474650b577053adc0783820a75e4904d4e8d4a1b750d42754f9c1ce594bb10f4664f79eea8b8d1be9e4d7f5
-
SSDEEP
384:nPy0lyY8HIIxdSoFl5TDPkl1wUtUMLJD7kZlfJDJ58eZUauc65:PyZIIDvFDTLAhLN865
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 3396 msedge.exe 3396 msedge.exe 2520 identity_helper.exe 2520 identity_helper.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 3076 3396 msedge.exe 83 PID 3396 wrote to memory of 3076 3396 msedge.exe 83 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2084 3396 msedge.exe 84 PID 3396 wrote to memory of 2088 3396 msedge.exe 85 PID 3396 wrote to memory of 2088 3396 msedge.exe 85 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86 PID 3396 wrote to memory of 736 3396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0c9098247581d7efba77e41a20bfe997_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b22a46f8,0x7ff8b22a4708,0x7ff8b22a47182⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13834716517401893280,825707497519744527,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD576d5a8779ceb3e646bf77d30692a1594
SHA16ea8a3d3f18643f15a394ca4be7b52fdf3c00b6d
SHA256a013c40b4f120b33c9fdb5b9555bd2638efa3f00c332b70c89c18190c3a7c7d9
SHA512dfa2af21153fb954687368bc38b59c2020132131a9758d2f89f2b59d931e4a4c4a339d94eae1f274d2e38eed64d2cc0901f8c6a899b6f05f8adb5bdd65fbe458
-
Filesize
2KB
MD5bd6110091abc62c6a867786feca3a70d
SHA1ee6e26d6358cef25e8bf6bb84712623fd94b9012
SHA2564d9fb7ada3dbe2352c382dfb2efdee1a00763bbe6361a2bff8d45099559e4a00
SHA512b4a3f717c2265d51d045b02da25f1f0582cab73533c9d1174b5109530da9f7311d587a418fa2f48399aa7ad835e7764e26fe3dbaec54c7ead7b62b1987f21171
-
Filesize
2KB
MD5d329cd0c30f017e3ae40e0484172994a
SHA1937a6f305bdf4b22e9d0655a547cfcb80436737f
SHA2567d2d4e03e999a52bed8af388db8819ad7c487df22ed79d4dd5b90c091a5bdbf9
SHA5127843828c157c7496cc7f7013121d0f3a39dca06400053bb969ebb67a283a9e1f65348650afb87729d27a87342a8b3b18a1359bc0da255af8b6b7b40a030e396f
-
Filesize
5KB
MD5d478edbc3fc305c139d9ba151f94b404
SHA1ac5d467ee8389190d5041d31cd0da271457224f7
SHA2565153194d9221b80d38e9db3255a2b4601fbda9979f60d5ffc7dab3ce71323afb
SHA512ec2c316c1bb59075de359dea61b4a78c9d9eabb1eb62808ae1e3e02241fa4b78017861528763fb9f6b7d731e0e4d34ba84881f889822693e76ef8b0f0c525201
-
Filesize
6KB
MD536bf67fb09f8ba45de9c64ad9975d0ce
SHA12c9c0fa60054343d9d0fcb1a7ae33f63ea522670
SHA2563be4cd57e7878600494baed8ef88d6dcda8a75cfb157b1b68691fc90ce22913f
SHA5129be878a446bb5c4df1f510b8726dd588eec56b2af3062ab3ad29250f3edf2ce9364ac14acfdd15e3a9f7549bd0f6178d2031c6bc9d4c40fc361b070552e3f033
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d4d7a895ee4a697fa678ffa23a125781
SHA1e28d58a075118a0b56e9e702b5a3dc1116467f76
SHA256c0b4afd6b31bb88025773bd4f062c670a73daf40a08c2d0a6a751853e0ade443
SHA51226ea21eb4dd60088f9a159a831922984c84bc065b7c87316cdcc1685e3ad43c7ae9f2bdc8ee928e2809cc31be3385977f6811ed9f9c3fbb06fd0faf710728ee0