Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
0836dfeb77f16db7140da7969b06f473_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0836dfeb77f16db7140da7969b06f473_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0836dfeb77f16db7140da7969b06f473_JaffaCakes118.html
-
Size
11KB
-
MD5
0836dfeb77f16db7140da7969b06f473
-
SHA1
6444fdc770784fa80b5f6f2a7e5359f4182c3795
-
SHA256
a85fb792010bc9c10f7d300a7b1a152c58f2e84c0edc82c2ad0a150ad1db3294
-
SHA512
887b1b9a79cfba0d08411489b1858dd8193404a0b4de11b463fc8323d9c5746cd62595472a15a6d84acfd55e0a804ece7bde1da6f10f23047d981f04313a84f6
-
SSDEEP
192:csz7mQAYS/6SXMMMnfLCuowPmIm3PHb76f:cBQAY86SYIHS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 836 msedge.exe 836 msedge.exe 1176 msedge.exe 1176 msedge.exe 2272 identity_helper.exe 2272 identity_helper.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4380 1176 msedge.exe 82 PID 1176 wrote to memory of 4380 1176 msedge.exe 82 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 3604 1176 msedge.exe 83 PID 1176 wrote to memory of 836 1176 msedge.exe 84 PID 1176 wrote to memory of 836 1176 msedge.exe 84 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85 PID 1176 wrote to memory of 2236 1176 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0836dfeb77f16db7140da7969b06f473_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82fc046f8,0x7ff82fc04708,0x7ff82fc047182⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1270749753227966560,2829120999631244241,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD562ea6d95d63723b7f08d254db4db1f99
SHA1cface13a0d4615661e88a361b95d97ab8326582b
SHA256c4b201d843cdac968144dc873a90079bee8bc3a011d9816067e439eb9f896428
SHA51220f5c3f4a1c93bb63a4ae16b27e3a29edde07bd81c73795c0c389eaa48f1ce81c318bbe37da67ffd80b8c0cb400d6d018fcfeed4b5b99b93560cee95a47fe809
-
Filesize
6KB
MD579fbc9ecd09d7ec01720a7d2a1d47711
SHA153497bd959f8ca36d6b2c88609bac8e17d5c7a8b
SHA256a3f4dbdb06a2f20ebfb1e72c61c98e9f1ae001ed2d6d5bb3f3e3ebb06e81af98
SHA512ae4e204432398200d0c2c52e5a2e6f383b54c93106c2d01f0b8c053cc012245a65999a95064867a5f3f613e368f3eb18c486a339317800d97bf896b27989a67c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54913eb2ae61e69665e618805b8472aee
SHA14f9c3df674e1f3a085924107d22da7c1c92d6300
SHA256ea5ac2f5807c6216b58da0359e41673f28a53267b5207a65131cd672c95ed2e5
SHA512fc6926716c15b86d6390c2e6e0a3cd12ad89bdaacbd6625b9e0c44edc09cd16fd5f529744b2cdf5684cb53188b8d6b760b52ea487072183f20f0d167b43c6ad7