Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
0c1867da9338b66ba351a67de178981e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0c1867da9338b66ba351a67de178981e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0c1867da9338b66ba351a67de178981e_JaffaCakes118.html
-
Size
139KB
-
MD5
0c1867da9338b66ba351a67de178981e
-
SHA1
83b34df5d003d0d12a6649496e6b1fe7734d4833
-
SHA256
d7d3602ad6e475b7384b0af4d8eefcdb648aca87a384eaee490b1ef8bf6aa3c0
-
SHA512
309a1d4710adfc4c4b6d5f21f91a00fbe7704d1c1bb9b991294ed55b66bb92a1c2423b41f80c7b456a824d07c05fd06708eccab71cdbd73a2b21d44913c80165
-
SSDEEP
1536:SSXOY38yrfZxtWmpvwMZ+l1yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SSAMOyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 5100 msedge.exe 5100 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4500 5100 msedge.exe 82 PID 5100 wrote to memory of 4500 5100 msedge.exe 82 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 4308 5100 msedge.exe 83 PID 5100 wrote to memory of 3372 5100 msedge.exe 84 PID 5100 wrote to memory of 3372 5100 msedge.exe 84 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85 PID 5100 wrote to memory of 3416 5100 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0c1867da9338b66ba351a67de178981e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafd9546f8,0x7ffafd954708,0x7ffafd9547182⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16420937321958126354,6683187205630180318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16420937321958126354,6683187205630180318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16420937321958126354,6683187205630180318,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16420937321958126354,6683187205630180318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16420937321958126354,6683187205630180318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16420937321958126354,6683187205630180318,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD5a31d69d14d1caacc6a59ad0ff6ef2628
SHA1bf3625246e8a91c0adc544f0360c55b6682a124a
SHA2561b2c6c4e32592fa75a5b5992d9c6ab241a0a6a8334860c4c058b8e0b0a32a4fe
SHA512056ab1d16580394e5c302319c3e33352b82a107584b5b357b5df8b1d6d9922ae4ff4b8ad575c7bc7895611a85517f29e716623ca82e9f59d23a0245dbec7cb06
-
Filesize
6KB
MD583171c28fa6730f7d42fbb0e7b346296
SHA1a44ed7a0f3cf590a7224894e2f8857ac98d5f1c6
SHA25610a1f40dfbee987297686205e08f8d5bb16d8058e2878e069f5906dd5134c01d
SHA5123b734c583dcb6bed96fbf66ffa4d53112bad2a418b57c01a84c0745fd1f8798260572033232fc03a86c9bc4e619aa0774899ee7790379547e1ae60cfd368e2db
-
Filesize
10KB
MD50029f43119dc2db58d9ea3aba1e35deb
SHA1ce81de1ebe8ba5e11c498bcc4f9c30019b745c04
SHA256cd76df6ea160871454aa8789ae0e5a480438e4f1bd86c256c1ce745c80cca2be
SHA5127f3764b35985f4266ab93419e349b4dbe2d96e123136dd3edbf74b659ad9f379db322096f11776c5c590afac0b26efa98e9db01b09356f0aa630794784cc0866