Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
0e03d0ee93243d88c694827af9b86827_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e03d0ee93243d88c694827af9b86827_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e03d0ee93243d88c694827af9b86827_JaffaCakes118.html
-
Size
37KB
-
MD5
0e03d0ee93243d88c694827af9b86827
-
SHA1
1ff522aad92b1edbd61c2eab50f755ed39d2c0bc
-
SHA256
bae92b7bf0257b57c6e206dbcace86920f91f636d449eb324fe4550a2153048b
-
SHA512
c168f5832c3a7bd828756fb14e480f6dbde42f87f38fbb551efbd90d7ca07476b78345a7d787037abc98e6260c69913a2734f595d3a5c60a36828aaa2ba19d9d
-
SSDEEP
768:jtVqZOtQKyoSznOn9gnVnRnTnV9Kihr50nTmP:eNKqTO9ANZzX1hr50nqP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4812 msedge.exe 4812 msedge.exe 1656 identity_helper.exe 1656 identity_helper.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1832 4812 msedge.exe 82 PID 4812 wrote to memory of 1832 4812 msedge.exe 82 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4876 4812 msedge.exe 83 PID 4812 wrote to memory of 4492 4812 msedge.exe 84 PID 4812 wrote to memory of 4492 4812 msedge.exe 84 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85 PID 4812 wrote to memory of 2072 4812 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0e03d0ee93243d88c694827af9b86827_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff877946f8,0x7fff87794708,0x7fff877947182⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8802145287940048173,11847003880234940244,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
641B
MD557fe21e315df25c2ca46e9f353403320
SHA123a08c206d6ff952a4f37ec2c47b0104a39d39a5
SHA2564b37e703f9fa95b85808a054347855f9dd0424527c4e3430c41a874fcf657ad3
SHA512d95f4cd1f75b5312671d34fc6868a296e985c8554dc3b4dcd81280ed322724a76c997ef1bfd0825a5c01d4361d7b9ff148ba917fa2bb22e3fddcef88337b4944
-
Filesize
5KB
MD55ce5e776fc81161dada138d81bd597ee
SHA16eafe1cc5283448e515af10ca4fd9549bc91823b
SHA256ca5c2530791312d918b0e7382b2c76d0bda9715211b7151a23f102aaa2c19f17
SHA512984ae40be174a80392fc179d2ed1a2673da5773692a533cbbe7cfccca8b2b607d511e35d622aea416ec3cbaae0c9fee12318dcfdd86d27a4290678d192633ead
-
Filesize
6KB
MD55bd4368aee84f167b7ac00751ee8f886
SHA1004dcb7701978323dca5ba3664edeb6a6a293f43
SHA256e642ef13164e7bda9dd928c7ecfa663b38116f4d7a3199d3388eff03c00715fc
SHA5129253d9772d032d3055c331514a5c6ebb97449e5515e9f07ccf7a57198824f177001e23f6299f7744b98bbd715a9e3f9f3cc1746ccfe1eaeb47b1daf509f65997
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD58736a0f03dcdfc8162f7b549da9b8b21
SHA1fb6270c547a34402d071b732a07d6ce7319ee647
SHA256b0edf05895452d20ba138900c3eaa0ac4c72bae52fd355b76091ecf3886a88cb
SHA512ca92c650ab0e35ed098a292d18a47cf29052a3db8369f504061c45fbf21041dc8e905d7109c7a3ab667b9620f45f95b2cb0631af5f6aa527b5fbc55c9dc3190d