Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
3cef7ad38a54b69c71fe2cf00397c2a3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3cef7ad38a54b69c71fe2cf00397c2a3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3cef7ad38a54b69c71fe2cf00397c2a3_JaffaCakes118.html
-
Size
19KB
-
MD5
3cef7ad38a54b69c71fe2cf00397c2a3
-
SHA1
afcb33dba3f863ffc9de311016dbf2c0fc2eb649
-
SHA256
23b2d4f6572fb439ccf50fe6c0785a1c559a320f32b800f254b97d39c85817a1
-
SHA512
5fe046c9da4b505c598da6e234f2e656ebbd0312322f17055ac5c57ee15d6ddfefc41c0c6a0fcb75ddc6e9bbbae5bc50f6988d6507f60ea601b58942f9e5ba1c
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIm4EzUnjBh4C82qDB8:SIMd0I5nvHPsv4RxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5436 msedge.exe 5436 msedge.exe 3956 msedge.exe 3956 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3956 wrote to memory of 3100 3956 msedge.exe 83 PID 3956 wrote to memory of 3100 3956 msedge.exe 83 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5796 3956 msedge.exe 84 PID 3956 wrote to memory of 5436 3956 msedge.exe 85 PID 3956 wrote to memory of 5436 3956 msedge.exe 85 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86 PID 3956 wrote to memory of 1612 3956 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cef7ad38a54b69c71fe2cf00397c2a3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d51846f8,0x7ff8d5184708,0x7ff8d51847182⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,11443715403292505602,17534148801953588964,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,11443715403292505602,17534148801953588964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,11443715403292505602,17534148801953588964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,11443715403292505602,17534148801953588964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,11443715403292505602,17534148801953588964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,11443715403292505602,17534148801953588964,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
6KB
MD58cda3129f2b762f84c7bf0a6de0f672e
SHA1491d96f9af1a08951a326bbe7ccc8b158707c292
SHA256ea13d5cd95809f5f0203db04865875912ff100df72ce85d14c9b990411e2c2b0
SHA5120ed9f0c8a60134884231f5b20545e5fa1994801d59ca0443434b3d1d8c3f8640456234c00d7f8e68f0973a454d739464ee4b814aaa35ff04d1e7ce8e76363ecf
-
Filesize
6KB
MD56953c9cbd3f0dd5c9ae663a1a8b72a8f
SHA140b8698300b3565e4da3cc31b601f54338336262
SHA2566724f9acd3346d411aa96af94684f3501a25ba7c64d27e5409eb5366cd03b3d2
SHA5120a826c222df7673a52befae54a6e0c55d83165a9452b4eec43ac452824d6f8db3e3c75f79896a78a213cd6e8605610fbf9d0bde8ef0f7e57c2462f03f1645f12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\eb9146d8-7cba-4279-9121-09cd6ccd6968.tmp
Filesize5KB
MD52c322584e0264703ead52bba8ed0df86
SHA13291003b509a0c26139b2bb89b0092d4f0ca18eb
SHA256bcb343948529c0d01f0418978fd674f1249ba79e1523a1760826438c9554ea91
SHA512087a778c1ab58a86e8f3f36d9eb787648590011acebc9584c5a53368edd0588f41481c11bf1efa9fa6e59105277da20ac0f85bb2d211b2a8e7c883b3db01bb6b
-
Filesize
11KB
MD5e1d2335e7f33b44d0a1a37ba79c3864f
SHA12251efeeb49479aa472d055598d44a35b82c1306
SHA2563bfeb13efdef4d35739b377b559e6bf781b2744ec0e6e8ada2d20fc8f27a8b4d
SHA5129382ec73cd4e4a21e4e38813692d3247220a80ba465d3bfc0d3f51dcd76b74c3f435400937c881f617e7a0aefc43b44844360c4d06e2f18023a69089df99751b