Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
3a3bad75d332fadd6a6300d231eb1b71_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a3bad75d332fadd6a6300d231eb1b71_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a3bad75d332fadd6a6300d231eb1b71_JaffaCakes118.html
-
Size
19KB
-
MD5
3a3bad75d332fadd6a6300d231eb1b71
-
SHA1
510bea9a8a78a317226c4d2437a83b0219bb1512
-
SHA256
21ba5bbbabff4dda669f5d5af00dd1b4bd7408e787fc03f8a3f831c5488b27b7
-
SHA512
c6edebef0dcc3026d165f2b82edea7f56ac3b69dc11ca66d83acf9adee0254a3f60bfb760e6aced516c3ce032d75097120849b50f3aa9f097fdb801baad76989
-
SSDEEP
384:ziVKhgES4VBD8c2Q3ROyK6zDemLxXucfIk99heAzVc9H:ziWS4gcZ3JGmQOIk9SOqH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 1672 msedge.exe 1672 msedge.exe 4580 identity_helper.exe 4580 identity_helper.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4564 1672 msedge.exe 82 PID 1672 wrote to memory of 4564 1672 msedge.exe 82 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 2892 1672 msedge.exe 83 PID 1672 wrote to memory of 4132 1672 msedge.exe 84 PID 1672 wrote to memory of 4132 1672 msedge.exe 84 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85 PID 1672 wrote to memory of 1040 1672 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a3bad75d332fadd6a6300d231eb1b71_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a48546f8,0x7ff8a4854708,0x7ff8a48547182⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,11776996064016216366,12290516901813715300,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5155ececba1752470d776b8c2bef07e38
SHA16f4bb2305080b476633a3008725d9a479b72c8a3
SHA2564ec3d4d1fe101cc93d7418636344691679ad001bf80aac558c417c08aec7a7bd
SHA512912b2f003bb5c85ae41ef9c0fb2ed04a5bd2e33b65e2a6bd973f2ba0de7efb487a8823ad461abc243e8703b24c7b1c4cfcb31bd82181261151665cbd85fce25b
-
Filesize
6KB
MD530ca140486148cda7594d0643af40585
SHA1be0d4083655315a69a9c0e3e62099e5dd3442cde
SHA2561ea2b0f34407c908ffa5fb67c2df02662e199c59d3bf3c45608d87074cde0946
SHA51214f56e1939047a0231cce7b94f1f4b968c3e8c0e74192df7f08274bd8d36013c536d9c453a91560a79c87198a75a8e3793398a5098e1fa41f6b46587dff4da7a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD51e3f89d789b2d1b53deba644e1d332f1
SHA1b5f2b983158c48f8edd722036d1d70073a306e71
SHA256988e8fc30e68dec4a129f5f418ff9a56f773143776c58c68fcedafd3d804e8a9
SHA512b808b2d4eb0a9ad6b417fe06bb17b4a9d989529bffdc3982c56fb958346978d008ecae2577bae1a5815fc57b604792e2801ed8118b12b462bdd570e1944f8ce1