Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
0d6f48b92f81753789ddb7a73023aa15_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0d6f48b92f81753789ddb7a73023aa15_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d6f48b92f81753789ddb7a73023aa15_JaffaCakes118.html
-
Size
24KB
-
MD5
0d6f48b92f81753789ddb7a73023aa15
-
SHA1
3eb9a8c07f0e16fc64fb7f512b21292df9ecd06d
-
SHA256
26a63417eed9c055815103f6f9232e508df0bfc4f2710bd3e23304c872752049
-
SHA512
f7693a11c4d3572130ac0d1b45d8d301d26bfdfa07deef682c0a28d20d706ad9bb369b0708c9914755b59bd331152ddd606f6eabaa7f05125c6af42d84275154
-
SSDEEP
192:vG2OvTmk+vIZRi3iaHQtitFxc0D+PKQKL1KxY+6NK8shK32GuDlzIDZ:vGzvTmHv2IEuFODBSCuhb4e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 4936 msedge.exe 4936 msedge.exe 1404 identity_helper.exe 1404 identity_helper.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 2440 4936 msedge.exe 82 PID 4936 wrote to memory of 2440 4936 msedge.exe 82 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 2444 4936 msedge.exe 83 PID 4936 wrote to memory of 5028 4936 msedge.exe 84 PID 4936 wrote to memory of 5028 4936 msedge.exe 84 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85 PID 4936 wrote to memory of 3664 4936 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d6f48b92f81753789ddb7a73023aa15_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7fff07c146f8,0x7fff07c14708,0x7fff07c147182⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,3735137457380112959,6655003213784027145,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a62fa3e732642db99639c32eae40135e
SHA1622244a6d1e5d9b60986d2d1eff28a37b3a2bde9
SHA2566ac895a6ca1ccd02d08653b6d074443576ecf7fe7271a2aa6be014207a84ee80
SHA5121cfb976f535a7589c8c4c2256c6e271a08c888a98ee8bd5a7038e6bf4d7449143fc0f9d05e96e280fd55f39c566957edb5ebef928f56041de4c9539ea00d7982
-
Filesize
2KB
MD5c3fa3c0ed9a9066a57f143ef704255aa
SHA1cd9af2b60aec21ab370995bfed534fc9da442656
SHA25609a76d8c98fc16af84ecf6a14111b26939da21d78898eda41b0cb34b60abcb8f
SHA5123d360b38a4e0a880f953ab49433eae96550185b3da56fc9575952711da2fb2ab5c6d0d6befeebe15d5e6d722f4083a23ca6cbcc7c7585f448368e2816557eaaa
-
Filesize
2KB
MD55fd06cd4dc750b02483a6d95eb570a44
SHA1205522b8699d6d040e1666e46e3d42bd683578a1
SHA256681b17bde9f9917ab3fb9911eccd19cbe9d68aedf28547507f13baa6e7aa7e64
SHA51228c6bba4815d9740caa1d53a13b9b94f1c92bade01cb7815caf5f9de9476a37afe899be5d124f4b31ed19ecb8d84cc89ebdc1c4f57df547f1c66928417d5d9ac
-
Filesize
7KB
MD5ed4c674f13fb4efa78f34fa20863b317
SHA1bac33fd0e1f90daa617cc0e7843299fc5508ce5a
SHA2564bf177725f15b415bf9894b2b5ce87b2ad6a4a82737efa9e5f4f9917d608480f
SHA5124a8b10235b1c98637eca3c4ef7835b0957ec46f230e621429f7a7da4d3f909ce64c97a1bcd4a87791725fe29ed95fe76a6ca16568727d71916ec77f0c3623662
-
Filesize
5KB
MD5140ef683405a4bd8b91113aad746621d
SHA19d27e8981cfb57bf2eaef10aa31f33788632b84e
SHA256937680771625bd61a986c17b7a1722bb2bfb2edf2551bf6824daa8e5738a0ce0
SHA51230cfb58c74e9798f64268f84ad43d3fd474b4cf0a2fe80f6a84c0fb38b004aa2c570b11447a82e9a17c4300e1690ffca89c1e8dab24f94c0c99652be63f6895b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e60bfab661132ca0047ae110de7a5fc7
SHA15073c0517da4ac14231cc1cb8dbbd22d90ac1dda
SHA256318ecb08dd8e24d3e00f0b602714a49fd6fd021556292e89d5b467e06fa0159f
SHA51295f185388e9b1f866f6b5ee176ac8f12bf184d7a58662b202e8e66e4c2211eeed68859cadf6813ee8c9820d48e8c0106f0960a2671b9cb72d12ce657bb2747a2