Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
3ae0aacb6d8355fe3bae28934b0866d6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ae0aacb6d8355fe3bae28934b0866d6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ae0aacb6d8355fe3bae28934b0866d6_JaffaCakes118.html
-
Size
22KB
-
MD5
3ae0aacb6d8355fe3bae28934b0866d6
-
SHA1
3db6e0d47dbc7d7973ee7b5e89c53e4557cf076a
-
SHA256
9fc985fbe5fdc9cbfb0a69d0afe4e39aa5a80f78234e47aa55d5030f8b837464
-
SHA512
3bed0a647d4c3e02b5f645a412922b27f0b223edaa0f52fb4707921102c5277005de93c7886b39765989d906cfec65a9e102f914cd099c7ec6e11b8707810fce
-
SSDEEP
384:SIwq2e+iXdIekE6WnLLK/RI0vFqq6hdxjzPYmkSpp6F+TDATrLdJyLKbZ9JZI9:SQ2eXdIekE6WnLLK/RIuvAxvISsPJZI9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 4512 msedge.exe 4512 msedge.exe 436 identity_helper.exe 436 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3104 4512 msedge.exe 82 PID 4512 wrote to memory of 3104 4512 msedge.exe 82 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 216 4512 msedge.exe 83 PID 4512 wrote to memory of 1784 4512 msedge.exe 84 PID 4512 wrote to memory of 1784 4512 msedge.exe 84 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85 PID 4512 wrote to memory of 2940 4512 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ae0aacb6d8355fe3bae28934b0866d6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb611046f8,0x7ffb61104708,0x7ffb611047182⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,15893416608307279792,11026446804855739485,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
6KB
MD554fe3bab4357b075c23d5eead7623c21
SHA197fe2ea7a343416fb6b0df17917a25d58ccdc206
SHA256f5685a9d263c7c02dc868dec0556add2aa6d56c68a046ba4ccd433e1804f5f9e
SHA5128166003eed8efa71faf593d9c0a6d49f1aae5936c7eb0a54867f912700c0556773aa1d9be90a54ef442d8ab2420ab6c57ae2f6be29345b8cb0e883b703163f06
-
Filesize
6KB
MD5369315ce32a9ab514a3d1bf5c64f75d3
SHA1f7d268b61acdf7b7e3556cdb743f2f4758048c93
SHA25647b250eb3361b9935f4c9dba987bf91d38b342634e71957fb145a4db5667a501
SHA5123663252021ddc27cf14ff0eb85d301beabf40053a367fabd353a7943862e4d6f193457e3e7713ea78556e696d9292f6e2c49d1c00f655d73036f44ad5c8c2970
-
Filesize
6KB
MD54c6e1b9cf63fae0f20cd55928aa217a8
SHA1babb4edfdb2d839b18ac1d67c0717af0559b9c95
SHA25609990e082bd99e6eb43f4b69677e9fc1e1247aff75dab25b6c65849024a42147
SHA512902758b355c59bdee21540872c0e2315f21c2f640d171584216f86e6b77e4053c590eedb383cfd345a4683c53e9941b408f0cf9777ebdf0c483a585d5e7504e8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5ebb76807b01b650ee2ed59da00c10d84
SHA1e3a16c0870e3063a7e6ab9be9cb2fb76f3b1c743
SHA256560251a0cbd229b7c6db26d7f883ffb8cf6e171afe8966426f7de03f461622b8
SHA512644fbdd20826b1b5ddd7a0dad65db29a04f0dbaab11a303aa34c1445fa01d71e02ccd488d65698f56fc047a014b90ae0e7e30fd2828fa98ac775d07d43c4a800