Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 05:21
Static task
static1
Behavioral task
behavioral1
Sample
0e1c851fc41265dd26c0d51c88c8e4b4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e1c851fc41265dd26c0d51c88c8e4b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e1c851fc41265dd26c0d51c88c8e4b4_JaffaCakes118.html
-
Size
504B
-
MD5
0e1c851fc41265dd26c0d51c88c8e4b4
-
SHA1
4da3827f5036b84efc8df8da759d0190abcabe18
-
SHA256
a72b60bf6c884e588d120c42ebb830574c2b4a7376915cbbf62790ae5e293603
-
SHA512
356f5991c08125bc813892ec19d64c8520edd371a137f9c776ff9e50259d05e97a9e07aa6246586c4cf30f17861cc6d9b9c750b09dad8c8d9e7635142bb20efe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 1748 msedge.exe 1748 msedge.exe 4972 identity_helper.exe 4972 identity_helper.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe 1748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1748 wrote to memory of 4700 1748 msedge.exe 82 PID 1748 wrote to memory of 4700 1748 msedge.exe 82 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 5016 1748 msedge.exe 83 PID 1748 wrote to memory of 2524 1748 msedge.exe 84 PID 1748 wrote to memory of 2524 1748 msedge.exe 84 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85 PID 1748 wrote to memory of 3256 1748 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0e1c851fc41265dd26c0d51c88c8e4b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd860746f8,0x7ffd86074708,0x7ffd860747182⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4368 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3373512449080918028,11694347806549539818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD5ac7db1897b49b605314933eb5fe3ccc5
SHA12451331fe0a369314014ec8f96197413e56e2f8a
SHA256971ffca226525d69d84bfd533c7b74484ecf6e447b48fe7e8a7852f1cac73316
SHA51230e5d88a1bfffa53b6c7173d99ae4e75fe93c9e757d71d656929df9088d742062e78546d6f20df0f1f29723c3b96ff4c648bde7186bd4bee62fc5da1899b674b
-
Filesize
6KB
MD5f37901b7f69b7a4f7affcf9b1ebd5b77
SHA10f006bac1865022e184d2e62d4ebbb54332cccc7
SHA25617ae264a4d16d00090fde7c52d69cf5d1c8980e66f653dba9cc413f6b1310d7b
SHA5126129e01aa75bb61fbfd1d1ab634a920a3251d5f75d40befa7c3caab7a3dea6840ebe1f30e7efbfff8f2fc46d9a78af9052f88a088388f69a7dfce726ee339448
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ff581d7e892a7c4aafd3653858adcd9b
SHA117f6971188a78c583f89e0c201fae2ee4ad06b22
SHA256289cc811e00057c352eaff269644890e77870e581940c4aa3d94c79447814b12
SHA5125b280d2588a2f2f57cc3c3b92b7e284a3b41e8fc1a5ca55a08055c1fc905f228889c4a43e1359d626a4849c5765dc32b682e52446c5d75450804b163a49e2782