Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 17:14
Static task
static1
Behavioral task
behavioral1
Sample
0fccf15cde8077abfdc2fa4942803430_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0fccf15cde8077abfdc2fa4942803430_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0fccf15cde8077abfdc2fa4942803430_JaffaCakes118.html
-
Size
71KB
-
MD5
0fccf15cde8077abfdc2fa4942803430
-
SHA1
d5549904759ba077de7d16016610fbf6ef4fe678
-
SHA256
38705cf347bba4a3a786de01333d22b271c90eb0f47f96af6942e05bbf82a4aa
-
SHA512
e5b5b8359af8abc0f95d40cfb1c2b34fd547f6988a361044c873c6ca86c0b4de30dd099a91267c3229e66568e3f5e82b399c4b9b536c1bd7fe039785097559d5
-
SSDEEP
1536:Of/yMViK8bjeA6FOqFn3EKNh/49K627XohYdE04XzucTAmydd+9wu1R:qyMVFejR6UqREVwxohYd94XicT9ydd+P
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 252 msedge.exe 252 msedge.exe 4068 msedge.exe 4068 msedge.exe 876 identity_helper.exe 876 identity_helper.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 2532 4068 msedge.exe 82 PID 4068 wrote to memory of 2532 4068 msedge.exe 82 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 3268 4068 msedge.exe 83 PID 4068 wrote to memory of 252 4068 msedge.exe 84 PID 4068 wrote to memory of 252 4068 msedge.exe 84 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85 PID 4068 wrote to memory of 920 4068 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0fccf15cde8077abfdc2fa4942803430_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9f5746f8,0x7ffc9f574708,0x7ffc9f5747182⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10871120982058960275,12386878286749074540,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
385B
MD5a94e5e841cdc1471c93a8d2f74bc69dd
SHA1de9b79da9813fe4e4911630d9bec71937309e04b
SHA2563c5f42b11c9b939503003b3e85fb1608b5d164cbf0cf3fd95ecf51edc524ea7f
SHA51250ef92b00c0252edb4d71648da42c4c886a65b3f6a7f5f6b62efc079ecc33af0e53b0164f4f15d3789a268d1a4ea9659a62d765ec79e5d0ce52c476898cbacc8
-
Filesize
6KB
MD552fa1fdc8b0aa0de037393a0a8baf8fb
SHA12ad3d8df1a040d002231c2f25306a3d40b05cddc
SHA2569a1b2027d374258270c0a35ecd9c02ee7e8a1255eb06ee190714f6d20e5ade71
SHA51258b54a2563421170ad3d84f20102741e291404557693194dad3258c62bcfc611d8a6325b50dc8ebb4bcac2a71f235dce48f796aa130cd345832cf50ce220b5af
-
Filesize
5KB
MD57686431141fe61b90ca39a8519b03aa0
SHA183fafc9c55a8b5a6144b3788bbdb4cb5a04c7c74
SHA2565efe34d96dc29a4dd6bfaa9731b1da2a932cbf0e8315e82168d93fe2e558bb2b
SHA512d2c538a8fd14f28dc829425f0705338f53e0abd5c1d3e080eff0e2bf44a527ed69eb99a652fbd46240a50d4cfa06eef4108a4f7156d86709b9275c6f117afddc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e6b7fcd2-05ff-4969-85bb-c42f7c158de2.tmp
Filesize6KB
MD5e4011a6d3b5346eef66b03518475074c
SHA1909f58e011b854e2dcedef07c1f78f4441a359a0
SHA256b049f0c563288dfedceecb005cdc301fa1a2a43bde5e6b2320a0278e2900c8a9
SHA512e5e0915ed6b057a686488e9b893841ff1645a5efe1e8f3e8c3203f380bedcee3adb11089d247e4573d1e2193e9e246f4ddec7eb49e2d96d62763a5c1ed2983b4
-
Filesize
10KB
MD5d59f7c5c85d4a8022c7e908caa18618b
SHA163c3738547b1418bf5e0e887f7704ec40b082c46
SHA25636e155bc91746cff922ad772f424faa3336bb8cac2ae506eb8410b40899521ae
SHA5128190cd7d27ac1bb4e04066a4a8eb367bbfa749a4002e3da0f00f6e3a5359755d53abae3da57398094419aa40dd50181fb36f194ab7190edbbb09f77930e475cf