Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
3cecb923543ba125785d0a00212ae70e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3cecb923543ba125785d0a00212ae70e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3cecb923543ba125785d0a00212ae70e_JaffaCakes118.html
-
Size
94KB
-
MD5
3cecb923543ba125785d0a00212ae70e
-
SHA1
777cd48a33e13254bc2cea587c7830d2b8d5cf1a
-
SHA256
105eb1752e4d83a0bb4863822b3e896139395500a76eb3a38c0fe60884295d70
-
SHA512
e9e1e1cc800bd490f89f5f5babbe3d48f95e1a77016fd5803ad58e82178df93542d714265732078ce129ef5c08c0e7910fbed815d70f504d6c90fc8b79188016
-
SSDEEP
1536:WMLiNjUuwekgttvf4KF77LrWFL11WXPuKjlZYyuBdkrY8mgHC+qpEyW:WAi3xQBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 4244 msedge.exe 4244 msedge.exe 4820 identity_helper.exe 4820 identity_helper.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4472 4244 msedge.exe 81 PID 4244 wrote to memory of 4472 4244 msedge.exe 81 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 3640 4244 msedge.exe 82 PID 4244 wrote to memory of 2896 4244 msedge.exe 83 PID 4244 wrote to memory of 2896 4244 msedge.exe 83 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84 PID 4244 wrote to memory of 2680 4244 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cecb923543ba125785d0a00212ae70e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cf6a46f8,0x7ff8cf6a4708,0x7ff8cf6a47182⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1289303036600041227,16973637180378120503,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0678d139-5558-4840-b8d6-f820f61f6a42.tmp
Filesize6KB
MD5fd4c6321d92a66a3498da64fb081e166
SHA1ea0d17ca94db5a888ecc77dddb7b112df4ac972c
SHA256ad4381417bb768070ea33d13714614530318a36963ec21b7d09b7ac170b6dd04
SHA5126167521fea20cf0ca8583b114573528e6616bf646f393be0497a37a1c1ef8bf905110e4b08924c0d470865524ec249de53028dae0b494644b8f6e6d1a65b4bec
-
Filesize
178B
MD5efb3e41ddcb00d4e436d59962fe73c4d
SHA14b9f2cbd664cf2136cd6966774f9ee04b4efa46a
SHA256edc776d59064e412098066a07cba55cbabb1e7d18534e1292d34003961ad3bb6
SHA51285a53139125a0e589b222ebee00d1c593eb24c8059b9f3f86196f8ef346cf7fc988493bb6f5cebf7aec2d0debc5017eff291b04e8aa37180d1ec5a6e2bb362ba
-
Filesize
6KB
MD5bc9f75cc3f1a7b9ef82cdadf30efc527
SHA1225a12e105c2e0cae231b6b250ad197d0f58e5c4
SHA256444c36818af4df57ee9161b927365ae45864c02fb2de9787d08f980b9dcc9172
SHA51246c8c7108030b897a97a20f134e2a5b91755209aeb89a7b92b6826ce8a0ac886bbde9e0337e75d58cb9d0b0beedef8c21460eaa0d94abbd0630b969eb8dd9157
-
Filesize
6KB
MD544ee14e388bbca10df74f07c7a9ee483
SHA172a5f8c9dab2c82916d1e278b9dc9e72b946e682
SHA256495b0d60c4dc58aea904de30ce2327bb2bacf6f0f3adcedc4d1044940e4db2e9
SHA512d9a483f943990215357a16edc6c5850064e6f958dd18923d15cb1747972ca54773ab0168b6c8591213f216e2cb02d7171b8891742a67797522b044e1baa4648c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD581aefd5c9a15edd95e93941e7aa0ffb5
SHA101ddc394628005987875b56a7b17834286623d5a
SHA256658a2438ec9e37d0ec10d84708e36229ecbd7857d951cb512d3c272a0a4c4daa
SHA512b9faa84be8be7f472bf2f4320cd736ed37b4ce8b86a35ea5b4b9e74def026fcb5c2a8b4013d3b43a870bab6ec454e65937d8182c02f860b84443615a004fea59