Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
3cf02b91a50ede4a6cbde4af3295a3f2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3cf02b91a50ede4a6cbde4af3295a3f2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3cf02b91a50ede4a6cbde4af3295a3f2_JaffaCakes118.html
-
Size
35KB
-
MD5
3cf02b91a50ede4a6cbde4af3295a3f2
-
SHA1
1006685db1e40b28ca61e75b3264975a12a91384
-
SHA256
3f964e163caddcaad40d45b056e49b486e34ea1a70c2ee7be1e89efe2176fe53
-
SHA512
75db077c5c3b728a921788166ba6cd2f3f1e674164a150a6e6b32ea8366d68c7ccea4875a203c30773522060dc915bdea868427e291cc7671215784c2dd87220
-
SSDEEP
768:zwx/MDTHxp88hAR0ZPXXE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOX6sggh6lLRf:Q/TbJxNVvu0Sx/P8YK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3280 msedge.exe 3280 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe 2216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1288 3280 msedge.exe 82 PID 3280 wrote to memory of 1288 3280 msedge.exe 82 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3080 3280 msedge.exe 83 PID 3280 wrote to memory of 3428 3280 msedge.exe 84 PID 3280 wrote to memory of 3428 3280 msedge.exe 84 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85 PID 3280 wrote to memory of 3012 3280 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cf02b91a50ede4a6cbde4af3295a3f2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13593888632568948624,14819870031333192984,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
614B
MD5f1e836ed08f45152570f5cb3c2d17eb8
SHA16057ecb66f926bc5e5755521f4bf9a1281cf7794
SHA256556c88e8b7ae9522287172b1980b60ac6963cd581762b3c0236ac0c8231c0eff
SHA5122579d7d871ca09da99862aba2cea811e2dfe1de84c14ceaa1b1e47bdda26ab376d716e674757bf26e9db6c54af449ac2983346bbbb1a1f267411d1ef769f8d44
-
Filesize
6KB
MD553dc5ff394769ae2c58db56f2bfddb91
SHA1b399c6945caf7d7c8195db945bb9b8345bc43dc5
SHA256ff0b2bf61cccb9021e0efde82ce4e2c057b93dd65ec62ab5fd1ebc3387bf79df
SHA512d8181cea0e73e69381d28e41be59656f1ecf570f293e923ed902d0f1acf37be3569ff23c0e20a33440ecd1e0998c62ea4ede19b518d81d3564983da82e7ae58e
-
Filesize
6KB
MD5d3aef9b525ca514a8629d10e1050eb11
SHA13b3338d7917b18385dfc09550b22ab7adaffb1ef
SHA2564bbf8023fc590fcacbd43d9e2bf3bbd416200d3a1b213a5789ceb0f73532d6cc
SHA512c2c09735fdc79d9733f8c12b06ac5460e469bdde3f0fcac3d29b75641ddd633f21b7635f2b872abb46e641f2774e5dcc56b6197877c11a43f26ae2a9897b3c79
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5005d1f05123a31c09a313d9745faede8
SHA11dfb989cfe24f7001a1927d037a776932f3ca059
SHA256dbcb6386324a532242100af6b0cdcb90fa212e20d9b1936d613c5be1288c0a1e
SHA5128fd5a0d1605397c6a7c7627233edfba568b33fccdae51a9f7077a7a6b7b922692eef020c5715b537c63d2344cf2bef1fa65331a9e5d4d8ff903b85b4d2edfafe