Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
0cccd35920c0f9db19175613b52f6b62_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cccd35920c0f9db19175613b52f6b62_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0cccd35920c0f9db19175613b52f6b62_JaffaCakes118.html
-
Size
13KB
-
MD5
0cccd35920c0f9db19175613b52f6b62
-
SHA1
9cb42e66f0abd501a2b438cf28bcb99734756cf3
-
SHA256
7de50c314f3bb074975bbb31ff4d47747369159d3945417e66d5884198e13b5c
-
SHA512
576b83a282573de88c48debb3665e902adf8c1597fe66eb24ea3b1107e7227bb1031e9c4e96ad5eceb2144ef5e4c7f50000101f9f799bbe370f6e52170b44149
-
SSDEEP
384:SgFDmlSsJzsRqLNGyi/MceQbQqec/u/g/SehesmeUPQKl2dCuSWMs5uHM:SeN/MceQbQqeXehesmeUPQKl2dCuD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe 4928 msedge.exe 4928 msedge.exe 2896 identity_helper.exe 2896 identity_helper.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4648 4928 msedge.exe 82 PID 4928 wrote to memory of 4648 4928 msedge.exe 82 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1960 4928 msedge.exe 83 PID 4928 wrote to memory of 1908 4928 msedge.exe 84 PID 4928 wrote to memory of 1908 4928 msedge.exe 84 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85 PID 4928 wrote to memory of 4752 4928 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0cccd35920c0f9db19175613b52f6b62_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc603146f8,0x7ffc60314708,0x7ffc603147182⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1303046364463247593,8025221202293384351,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD50b4377416c99a9de4ed3bfe241dca2ae
SHA17887be97102c3d1f9a4ac682f91b53101d29c876
SHA256d6a4e292895d12204021a86823b3aa5dfdd6a8f10ad7b774a23567db6f7d22e2
SHA5123eba4a531dd6acdcf97cd5c41a671ee541af680c4e66a85217dfd7e2904306412409173256fedb59713c05c6ca68cf4f84839b8f5adf19d8d0ddce3e4696d954
-
Filesize
6KB
MD50ade1e60245a019808158174ae32b079
SHA1c77312475f9e44f633e39614b335c7c9b5844434
SHA256b7b2418c08d7ac3fd866bdc9dd88ebec97248cb56e1d55468ef3726295264fd8
SHA5126b0d3afac7621b70f55a6e588e55f042aafda101bd76cf0997221635ef72f68aa78db2302b76d37aa404dc4a9bdbe87aae9cd9d2d3175eaf45626d87e1f2fe32
-
Filesize
6KB
MD524e9b2b3e0b68a7315b46879e6c75070
SHA1213c83bca5a1e6e23203ca7161e6498106e5b377
SHA2565cbf8b3f75c2d3c6d42e58e2e52271e4e5845ad37c95c2bf6068cfda57f2481d
SHA512ce89af242f2a3bd97ab58eec2f5a6e5d51ef958ac2222419ffa0a1a0c6c094e2b2695439ed5be79f338089af41b4c4150abda0092dc8d4c949c873df95b679ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dc66c22a570c8c2d4b36dfc1b5430583
SHA1840f747d6a0912350881ab157ebd88c0947843cb
SHA256a758c70b7fa66fd888f892bbef8719e62fb4011ee67c3edf4df1d50098cad1f1
SHA51204dfaf6dad672262154de293a643a3849020b7f014693f1325c0a6527dfb0dbf4452609c61285a7a9a20d6e90d4fd423cecab13f148b808e08c8800bda41b361