Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
0c0cbc62f6b83d2edf05da52f6c2742d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c0cbc62f6b83d2edf05da52f6c2742d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0c0cbc62f6b83d2edf05da52f6c2742d_JaffaCakes118.html
-
Size
40KB
-
MD5
0c0cbc62f6b83d2edf05da52f6c2742d
-
SHA1
59bf34b6348e1377ea88820f08f3450d1da3b64f
-
SHA256
b5f78804790b843b799948cf2048312501465a3fbaa99a378154c3564e3d623d
-
SHA512
12e80250b92f0fa48dba0318c5191337584d7f881724267a0d38dd3ce55201f6edb9643b24dc56f06addf56ab4ca07717ff02581abc550d4d8eb0ed0047f4eb1
-
SSDEEP
768:pIdJpeYC2KKeNIR59dOzCeKGSEsAWnpHTeetDfF:qdJYP2ciR59dOzCeKnP7HietDF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 3792 msedge.exe 3792 msedge.exe 5000 identity_helper.exe 5000 identity_helper.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 4808 3792 msedge.exe 82 PID 3792 wrote to memory of 4808 3792 msedge.exe 82 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2624 3792 msedge.exe 83 PID 3792 wrote to memory of 2672 3792 msedge.exe 84 PID 3792 wrote to memory of 2672 3792 msedge.exe 84 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85 PID 3792 wrote to memory of 3424 3792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0c0cbc62f6b83d2edf05da52f6c2742d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c5646f8,0x7ffc6c564708,0x7ffc6c5647182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,3823213104535226986,6924133471392190183,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
469B
MD534592e6bc74597baacd8678ee2e9abd1
SHA1abdc652961fed1c4a44a5b30c867e7507a0d18d9
SHA2569974531a12187f9367f095f36db72d3629c73b87ce4d5c45dc89d5f728cfb7f6
SHA5121d4427113f966a9758b164ed293d0323c316b143ecd204466d8abb16362f53ec748adc9861001ac2c2f266a63287943128ac8efa22aa69af389a54a762d983f4
-
Filesize
5KB
MD5e75aabf7f566f917fe839d57f8c20eab
SHA1fc8bab01e514245f6e8bf178b96a75f126a3f687
SHA256cbd7ea7601564d1fbdd9351b027dc0cbd7b195675917365cb9fa1f6538f60f9f
SHA512a3613400de2118a60ef857c3f2264c0e3edae9540c24bf0e33f7afb92ab76ad4cb267dea1937f2bf93da24237ec40974e1010dd1d472917817fae870f35f7d75
-
Filesize
6KB
MD5d3b33234c45ad52ed4274bb9c7a44f8d
SHA10d0afa328ba6f6fc2aab4bf0aa323fbd48a8219e
SHA256743b8e80ec948538f38c53fde5975a7996ebf8a20452e4a3f2892f8468e2c379
SHA512474b7d3ebb1e7ffd8f9a333be200c0a28a93b0eff6a66ce8f9e2412c3b7c7ef06cb5177dfeced407155f17d6f19fc760ee4e851b68a6985ae76608aeae6724e0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c26d5633e12eed21205f1a4db6993d79
SHA1bc2be4687a6fd30128ddc07e03288ed26af680ba
SHA25629d36eb0a38fedbcdd99bb9bc0ecc67ebcf044e07ca7dba85e7fb99b93018e94
SHA5121511e7641df55669d04506df8846f4f8fdc8c2184ce3f248b7f1a0b9ae7606b26c9894b2c664792dc7930fd4b427f2d6747d6223a827b34ab5b9cfaeba547200