Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
3ad0f51e71922c1e494ff90ec35ae607_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ad0f51e71922c1e494ff90ec35ae607_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3ad0f51e71922c1e494ff90ec35ae607_JaffaCakes118.html
-
Size
180KB
-
MD5
3ad0f51e71922c1e494ff90ec35ae607
-
SHA1
c680e08af737508880a6dfffb621e64a622a49ec
-
SHA256
22a32aa0dfd8030ee6d85fc4e8180bc07527658314deb7a482f8718eabc245c1
-
SHA512
3e6992a6f0ac476010bcab6f1ca5816f78e12216a1bd982ea60dc327de5885542d5c3d273762d5ec066e81334dab66c47f03b4725861172ee45379f61469d4c2
-
SSDEEP
3072:fTLeebeDokclMiFuO6xAY0AQG1jgnXL5tJbyJgGTdl8nN+YBqqO9hraE3Odkwvei:/eDokclFuO6xAYSG1jgnXL5tJbyJgGTU
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 18 sites.google.com 55 camo.githubusercontent.com 56 camo.githubusercontent.com 12 sites.google.com 17 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 4996 msedge.exe 4996 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 980 4996 msedge.exe 83 PID 4996 wrote to memory of 980 4996 msedge.exe 83 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1336 4996 msedge.exe 84 PID 4996 wrote to memory of 1272 4996 msedge.exe 85 PID 4996 wrote to memory of 1272 4996 msedge.exe 85 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86 PID 4996 wrote to memory of 1808 4996 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ad0f51e71922c1e494ff90ec35ae607_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7a7146f8,0x7ffc7a714708,0x7ffc7a7147182⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15778255069866058580,12162436476486698181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15778255069866058580,12162436476486698181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15778255069866058580,12162436476486698181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15778255069866058580,12162436476486698181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15778255069866058580,12162436476486698181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15778255069866058580,12162436476486698181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15778255069866058580,12162436476486698181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15778255069866058580,12162436476486698181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD57e6d827a2eb2990438cb47d30bac0cce
SHA1c0ca9b53f2b0a6042db6ba9a5fd848c9fb39360a
SHA256c1d2a98931d192cd3e2a051a06b7eea25febef4eb43fdefb7fe98c3cc240ef95
SHA512013c20aa182b73631cc9252ee480d09180a47af803a9e39342b301436dfee455df10d29ce64c9ecdd265ee6c21495bcd143e97e9ac0fdabaabd8cfed204a9988
-
Filesize
2KB
MD58cfbffd6576c15f410f3bd91ef4f30b1
SHA124d707f424d01e004a1168eb4793bbccdef38556
SHA256eaf5f07115e0aaa971b5a9f34d17f31fb1cb7eb7be28fa708cd70069fd2e8318
SHA5127903c43555d298eea2da070f0776cf72b832905b109841f9a9efb6c10bc9ce3bf64cc1e597d594ba2c65218bc646567eb00db193b45430f73a10c0fce135aded
-
Filesize
7KB
MD5276bb144e013d4ae62d79a6d37b2e2e5
SHA114d68d2c1d4808840a1aeabb30c5dac6c6835e0a
SHA25605fcb9b169ea35c8c21255fb33ba9903ef058591561eee2f2232e576e103d15f
SHA5122c2a9bfd9383e6598014942293537d33ce363ebd8fe4af1620204c49832ad88b3a226af32ea16c3a038c386a0bdd99bb9ab3ad6ee92b353a82597331c53c911b
-
Filesize
5KB
MD5d028cafb14fca205c2d0605127914257
SHA1d243f352121613318aa48ff6f5bcde0558693689
SHA256a56210a66cfba2ba49b1750f34bd76bc02b63698c9a15c248978a1159ff7ce77
SHA512b90b2fdd3b24453fa2d6b5440e0873a3030e36b48543476c957872a44b332740746b0fea6d5786cdef644872a647d6cac243d1c90c49fb28e6341f717dd10015
-
Filesize
11KB
MD5056abc4d83e280018eb172a5e06d5e74
SHA1ed42fbebe23a2ec1e2d8f36cadea8f1d66ff4205
SHA2561b8db989a98481c057d789f007dc0bb6283cae01f32f717b9f9cbba2e5c21674
SHA512ead6a933f9fa97b489480d94987b2642554e4c73cdf7a22f02683f83de13070e9829d0e6c0b255d19d7e9d27910e93f19dd8ff0dd1f1a87fb9dec74ca9ae9106