Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
0fde5d863ed066698cfd273bb8fc4072_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0fde5d863ed066698cfd273bb8fc4072_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0fde5d863ed066698cfd273bb8fc4072_JaffaCakes118.html
-
Size
21KB
-
MD5
0fde5d863ed066698cfd273bb8fc4072
-
SHA1
f200979fc47c2c87a43eaa0937e26aedaa2dbe9e
-
SHA256
e98e966f3449fae7942ea81021909d3c061bdd9d43e66013b4cfaa920768b68f
-
SHA512
615482651cdd2602f20447ebee188a62742e72b0cc7f2a8dc0c9ffc330fe2d2a7318a1fbe585904466b9124865d79a34d8dd403ac8484548f65166eff547714d
-
SSDEEP
192:3pIhliZTVh0dINFHMFAg998wqh4vdZixCE0PxwWvTKTrXbiiTsK4Hjs1MAujdaMj:3pIfiZX6VCg998wqh4vdsSLwMiS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 4596 msedge.exe 4596 msedge.exe 3544 identity_helper.exe 3544 identity_helper.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 2480 4596 msedge.exe 82 PID 4596 wrote to memory of 2480 4596 msedge.exe 82 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 1592 4596 msedge.exe 83 PID 4596 wrote to memory of 2656 4596 msedge.exe 84 PID 4596 wrote to memory of 2656 4596 msedge.exe 84 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85 PID 4596 wrote to memory of 1216 4596 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0fde5d863ed066698cfd273bb8fc4072_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed34f46f8,0x7ffed34f4708,0x7ffed34f47182⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,16343897239353397384,67821816735004267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2b3cfd77-f435-4ede-bf68-523e1ef581ae.tmp
Filesize5KB
MD5ef42d3844175502218e3d4452820a533
SHA12a22d7e57b5fce7d647072c062f5e7668a83d599
SHA2568d935444d5253fc51161a92b04304ebaef6ba3678faaf531a82aaff86a3a78a8
SHA5127780dd2389ee93d839e4ea6f3bf0cbcc924e23917eb3398320d5bafba405baecb2d726b0b15fef31c7957a15c46282d5e82503f7a94490edee36091b7bae95df
-
Filesize
6KB
MD5e5aa4d184fe94fc08fbdf237a7eab1c6
SHA15f054c480a684ea75498059d13c809001bae1f74
SHA256808f4fa77499cc9f26e50b3ad957c76d5302e92871ada31d757672091a14bb2d
SHA5120dde183bffafd91aa224eccd2a9a0b8c6fed7a222828bf9c8d6e28fde43781a3b77522f0e9e7a82f493534a95595377c0aa3529b43f430606f2da54564df53a9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b852fa4c953f7f22e483f972ee2c9f41
SHA194144ff95454fe0e340d1f3c06307b0ea6706b83
SHA256598c3f2d4808f8b521ed71370111271951a458e3f42c7f601d78da54f4051124
SHA512e810c5bd89f5bd907916483e294ed02c27cd6ff1e4843319baef07720826b9504e30d064334cb3116fe51ce2917ed881e94b48876d8a3ea799a669140ac00276