Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
0cddee2c6c920e2af9f2d45f082be5c8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cddee2c6c920e2af9f2d45f082be5c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0cddee2c6c920e2af9f2d45f082be5c8_JaffaCakes118.html
-
Size
20KB
-
MD5
0cddee2c6c920e2af9f2d45f082be5c8
-
SHA1
5f92074108d8f4e6c8197a6952d1dafc6ae35048
-
SHA256
bc13972384fd688528b19e2026d8f8a90ff2542def466eca94b432710fe5b931
-
SHA512
b14f2a0f287771df0dfce155f8fb9111232e5af68300aad9ad11ec530f6e555d2c941397149b1a4435f113c4c7e2c52a5652c603f82fe55493edb6e50ef92f6f
-
SSDEEP
384:1wP3pRkj4Z3Em0/Mq8D+yLIgxHfj/AmI2ItDapoj5:1wP3PkUZUm0/Mq8xLIy/j4V2ItDcoF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 4952 msedge.exe 4952 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3260 4952 msedge.exe 82 PID 4952 wrote to memory of 3260 4952 msedge.exe 82 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 2288 4952 msedge.exe 83 PID 4952 wrote to memory of 3460 4952 msedge.exe 84 PID 4952 wrote to memory of 3460 4952 msedge.exe 84 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85 PID 4952 wrote to memory of 3836 4952 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0cddee2c6c920e2af9f2d45f082be5c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffc1a4646f8,0x7ffc1a464708,0x7ffc1a4647182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6560 /prefetch:82⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,8019187215700678832,6291091899819987934,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD55b9322d3063526d1f11835e9266d6ff6
SHA1d8f00c2e084f6f80a9431d907ac8c740038b444c
SHA2567a67499adefe6bd1eb3f3ba47ebfd9f35bfdffaa5047c305e3ef8221b6afc0b6
SHA512e5d88cdc82060fe49a2ab40ea3e7705e145cde62c08215e86a215116822b5b807993ee7631d67ff13cca840ff71e1daef9c6d5736c15503664ce046d768b6306
-
Filesize
1KB
MD5d5a30a0cf1200af959f32dbf3fa736a0
SHA1f5788721bed44f8af7ac2f52cc89e43bb9628ad7
SHA2563fc978a42af2810b07853d55baee4d2977b9d1e0938dc550c1f8947d9cddb648
SHA51267a9c51e25c3d10a5cefe94fc0864c45c15698fe9cac0b7954e3923075d6559c4927e2c1321e84ea399640fae22eb9ab8f1403e319a596c307ee014a1251d1c4
-
Filesize
5KB
MD53819439099c778f830a8e45ae97344c4
SHA1693d15b3a482c5d4ca15329296c52e663b363a85
SHA25687fdbb8f0966d2db38389bcee7ccf4bfefa30b38f342d873ef0354c5680395a0
SHA51250022b3cc865611f9f2cfd33177ab5319741eda0620804dfd8c07738e75997aa7a0761bf0853aedf701926fca11e17690dbb6c047105be71017bd23e4cf563c8
-
Filesize
7KB
MD546b08780859cf5aa7b9c4799980b0e39
SHA1f252c5a9acffb769f1f395af0e4cd7129a5e29cc
SHA256a8b096d6024e9f492a7f788b9fbf57addc4ecf23a060d1ffcdeea9036b470cfc
SHA5129c58def94a3906358201bd3268d100c1d20749b9d146a4c1df807b69d161eb6cb325c64abd89547597d04893e1c1073a93b2167fc7236c93f86f6f32e093d043
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52cc2360999e8f588ba96f37e7f085263
SHA13de23878bdc8714f258f9de3490077c6a824ed8d
SHA256e1835b156540cf384a8b7cdaf1f16c7467d1d868f02b21e92018b3a9302a0e15
SHA51294c5310d2142bd39d452d500da3fe7010086ca285a8cf9c36b50e410d609054935868e9a9c090d5feb66303704b7ab8ee3585e4e853b4402816fed4ef4e5e280