Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
0efb6efe5ca049ba45beaa148846748d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0efb6efe5ca049ba45beaa148846748d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0efb6efe5ca049ba45beaa148846748d_JaffaCakes118.html
-
Size
11KB
-
MD5
0efb6efe5ca049ba45beaa148846748d
-
SHA1
dc788dff408a6e12142dfb167518fa78a26b4237
-
SHA256
b7b62674fed1ac8fc675baf6bc2f0068d91b35d2c5e69d059b41e9387585abcf
-
SHA512
d98f8e04cffd2757b163d6ba0dba37dbcaeae4cb299166b0705f337ee66f84040a8ecccd8cc234f8af2042e5277dbb14062338efb6c158a6178cc4845cd74b54
-
SSDEEP
192:2V0lIsr03EV8k/w1wvqytBDOnCn5KeF01JauBuLbdU8d:s0lIcuEX/gctBDOnCn5KeF0JaguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 3116 msedge.exe 3116 msedge.exe 2684 identity_helper.exe 2684 identity_helper.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3116 wrote to memory of 3216 3116 msedge.exe 82 PID 3116 wrote to memory of 3216 3116 msedge.exe 82 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4884 3116 msedge.exe 83 PID 3116 wrote to memory of 4620 3116 msedge.exe 84 PID 3116 wrote to memory of 4620 3116 msedge.exe 84 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85 PID 3116 wrote to memory of 1188 3116 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0efb6efe5ca049ba45beaa148846748d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe832046f8,0x7ffe83204708,0x7ffe832047182⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3333080801261780778,9504880423835789193,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD511fe7b5484a18489817e2a48158ed83c
SHA122dbb4832bd5a6aff98e7ef1c4e8e57886cf74ad
SHA2568f21bd283b6d8eb8fbdf88c5c820c14a69cbd4b05396c9fbf5480ff8ceba9a1d
SHA5120a860891e7cc881afb10ad6524ad3b134153665ffdf4aaf105e53662f84e253ffcfd6eca0ffb9b0e8a04e61e26d0d16a358802daca03c6ce36380c4472953365
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5f9e93e9234a054653400c71c31777ef5
SHA17ff93e9ada841da757e264067415aed015bc7d8c
SHA25653372f402c22857ee6d22488dabdb36167975a574dcce948f9c4f09efab4c864
SHA51206010520ae89b636a2771103e69d704f0cdfeca4a2f12074cc8bc038ec4cbfd236eff7169857dac3f3c839c1ce60aa56a6d693bfe86916e64ff1831728d35072
-
Filesize
6KB
MD5e2829322db01c18cd7370efcb85d1ae9
SHA15da04d4bf8286cbf857985222822443efa19d5a5
SHA25696a152d028a47f673dc686b84356ab2ad74108205f3915ff253e4f8adbf9d9e1
SHA512c1b8f8cd00b165ab8a1b672ed4804508860e5c91d5fb39745cca2e23f88c6fbe5eddcc548caf5d7a22cf5114efe05c886973d465b3cadacfc208d5940a59e19c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD567d769ba4a1106ce3c880f5cfd8d255e
SHA124ad6508d343968ef607e64a37d8410c89c2e9d7
SHA256ebcc0af95a15e16f314e2fb9c5e789392ed843d498b95f5c639ab093979a3da8
SHA5123901b9841a110c951075295a22102eb4fa86a1345152c5d352a70c6c1902d3135a85f170ec111ba05fe20f4486dba71eb33a35d75d388ff088641be5019dd65c