Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
3b18fb035c102715a3ce6ec5a5bdff4d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3b18fb035c102715a3ce6ec5a5bdff4d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3b18fb035c102715a3ce6ec5a5bdff4d_JaffaCakes118.html
-
Size
45KB
-
MD5
3b18fb035c102715a3ce6ec5a5bdff4d
-
SHA1
d94123578e00cf11e9eca50b3a6b7ffd2003928a
-
SHA256
ea6f444f0db2fb55b71aca8e74fafe449348e208ede43c33c2a1a84e6b34922a
-
SHA512
d8ca081108c15d5b61626588b5565b7121bfa07056c90b08d0a0f72cc51bcdf4cd4c0389b5d900cacd566ed50606bb374b706cc8880f20ccfc8ed17875c1e08e
-
SSDEEP
768:NdD5WEd3JRawkjAqkQkX/QBeeeIeeeqeeeUeeeeeeeeNeU3vm2woeEVwoljtb/Yg:NdD5WEd3JRawkjAqkzX/QBeeeIeeeqee
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 2104 msedge.exe 2104 msedge.exe 2836 identity_helper.exe 2836 identity_helper.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 4800 2104 msedge.exe 83 PID 2104 wrote to memory of 4800 2104 msedge.exe 83 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 4336 2104 msedge.exe 84 PID 2104 wrote to memory of 1652 2104 msedge.exe 85 PID 2104 wrote to memory of 1652 2104 msedge.exe 85 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86 PID 2104 wrote to memory of 4676 2104 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3b18fb035c102715a3ce6ec5a5bdff4d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee1a946f8,0x7ffee1a94708,0x7ffee1a947182⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,13092843554788681103,1164199723469244057,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6d9c6300-2349-4c8b-96a5-7e9979910833.tmp
Filesize6KB
MD5071921ef25f0662ffe86857b3018bd26
SHA14cb2ed6a667e9b5b57657962d948ff47ee22f723
SHA2560087cb22d49163ea2834392e4037e73054cd425d45f70bacd263a45a1fa0c52e
SHA512f66b37543ba0fe3c6b19e63aa8e78c412fdcef4510761b3a3b28d4bd791a4964f823d4ef17674e4f1390152f8771e6a07a4fae66fa71ab461dac1e45402f889e
-
Filesize
453B
MD510492c6f945b1a60e510515b59aee811
SHA17d3fbf36e83336e55ab73c12de80c08edb75ce4d
SHA256c44f6945311b7caee9223d8d3d0cfba87b8b25c825e45147ecbe1365b3afe179
SHA5124886e23091e030642d27e62024c951941a0dee5efaefb044dfc4cc0120ed793b90cac1f29b051ed78bd199dd9f244a9e03e53c6a6f1074c4067ee91332cb77cf
-
Filesize
769B
MD5581512fa2a22a08e8704b2c0c73c0db6
SHA1245ca0becb894aa538e2d8a29615f826133e687f
SHA256f2beeb9a54771e5bee4fb2f312d38631c05ad042a85ffe96551567ca322400a6
SHA5127d8c3c638f19526b5db4b1c36a2f95da0c47c798bde68fdc83719a966a1cb8890b7d5b284675723c7c1319b65388a7699019d2ce0cbd8fa1295e38f937132c25
-
Filesize
5KB
MD533970fbf0b774dab83b8f53381c7baae
SHA18988971ef818fe5296926dcefd3b57558349e633
SHA256c8ba51be0140ea757c5e398f221e6d0f8080bcc1623617fc849aa452b5aecd4e
SHA512b73e2ca0f22145c32e0438a2bff4140e1e36a7497e194d49e36d8999818cd8939f305363e9c9518ebdefdde38ad7bc38c93071f5a8fbdc5632ca01f29aeed569
-
Filesize
6KB
MD5d638764a0255279eb9e60dc6e9c28ac5
SHA1a4ec001c5aec01e60d9eb84c7add5c34bbe12c5a
SHA256699093728cb4e72c0f929c3d48b7cf233bb8ee860ba8fb31805edb4fc3cc6b9c
SHA5124975965d9e92c06e73945617f5274d6dfcb680a6567221155f05842d47b081ab3f5fa9bc14ac201934e1827374e2a46b8cfe607f803946fffd013f2ab66c801b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD51f4fc070fb8c3addfdcc9472d1e0e2a5
SHA16b96e537c97bad17c6430b3b2fcc702cf61cd4f5
SHA2563f65bbb688fc833738a623fc4f235e1eb6a0bfe62359da6f064be8cccd75708f
SHA5122fc9ad27badde9804346c95e12f365fd924c421dc00c7ef447c06609ef71df990d7a33daa23ec4f85e6fb3a25789c0d3f14eb17ec4d19ccdcbca3c0b8993d9d6