Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
3a2607c2d62f27e0458623179b583f45_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3a2607c2d62f27e0458623179b583f45_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3a2607c2d62f27e0458623179b583f45_JaffaCakes118.html
-
Size
10KB
-
MD5
3a2607c2d62f27e0458623179b583f45
-
SHA1
373ca6bf6adc36441dff99c1f0b46f1ae4d32195
-
SHA256
5e072dac514901676d29e7435d3a04ea019078c2667d08ddd830d995b19c08f1
-
SHA512
6e17a887063909fd55328a32f20df550fd560431ffe8693ff9f8129930f639f2992864728a935f3d8c23accd358c2b0d6867a64b625dc59f6e2be1fc3fcf613a
-
SSDEEP
192:epJElpD1lU/ijLOTciZ6jB7nTRUO3rAru1ziDo9x/r3usZxEua:QIE/iOTwjB7Tau1sGxj3usZxEua
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 4640 msedge.exe 4640 msedge.exe 3172 identity_helper.exe 3172 identity_helper.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4640 wrote to memory of 4896 4640 msedge.exe 82 PID 4640 wrote to memory of 4896 4640 msedge.exe 82 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 1988 4640 msedge.exe 84 PID 4640 wrote to memory of 3124 4640 msedge.exe 85 PID 4640 wrote to memory of 3124 4640 msedge.exe 85 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86 PID 4640 wrote to memory of 6128 4640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a2607c2d62f27e0458623179b583f45_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa12ce46f8,0x7ffa12ce4708,0x7ffa12ce47182⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1364 /prefetch:82⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,4191612882297208131,12183884582209411027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD55a19c1103743540eb1725abdf48769c6
SHA11388ef51f9af63162978c080b4f1bcfb1212d640
SHA2560933dfa698156211231f56fabca76549ef1bbd671237d96b5e012861278a2fc2
SHA512df48d76e3b8a21ca367afd49e853ac82cb2afb7d0bafaf5aa6f6032674f33818a329568451fd99565a7c06cb7b98a875fc307a201107c5d1c9576b3a9ab8e415
-
Filesize
6KB
MD5540f0a4d0eb3a614983d5931dfceac4d
SHA158384854bdde0ed5966a9328fd7471f595f3b8da
SHA256939963f0f8975da89033a2687e2329677dc121808a8d31355df24d054324c35d
SHA512ce0d0b86bd1baec39fa22ae93d623255b98019dde22e3d99629e36445248d89119b1a3ed19490f4f621225494ebba847adc966cec5d0ed55831409e5004ae569
-
Filesize
6KB
MD5bc3ad22a30c74f9169e57317aae4f69b
SHA1cf822ac4b715d5e499af0294d28952f2ca40006c
SHA256aacc0815fe53f6ff3445d3bd92d3e9f98236784be2cf909ce68480eef6f14593
SHA512ec8b2f8373c41f69afdf1147bf85d83ea39ccce6d0725f0139a4f2a900cfebd86a11ab5e0506912e01da2b87b0a2b7907e39196937d034070d1905d1d6a5e5f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e114230df7f257dd1daa6454d9cd125e
SHA15858ec2729653d7080228c4cdce7c03a1878fba4
SHA2561975b686351c5c5942a86ee42c5e59d8751ce23a4eebfa2f5acd9996292ad33e
SHA5124c9ddb1f1f29a5bf590598970698af49f37bc7cdc4c5fe4883f93a904df8492aab469b5ef3d2874f00cdcd22567947a703d4faf2ed2978cb4d12c7c9667b9283