Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
3d0772943e0cc487ad7d537040a3b098_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3d0772943e0cc487ad7d537040a3b098_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d0772943e0cc487ad7d537040a3b098_JaffaCakes118.html
-
Size
18KB
-
MD5
3d0772943e0cc487ad7d537040a3b098
-
SHA1
1636b1afe1ab85d2ce710ccee9a3a2f5a8f4fe2d
-
SHA256
53d33778782f5feb14c1a8359f2d9743e6f6c14930d54236d36aca3be7272656
-
SHA512
608874505f848a21e9ee7f295a4401d766bf4b8b6132a4f1fe08ebc1f876aa7ea80d55cc10f8c044754003e1c57e73dd8fea37db4a228a5ecb4869c1cf0672a3
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIo4WzUnjBhqs82qDB8:SIMd0I5nvHjsvq/xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 1148 msedge.exe 1148 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 212 1148 msedge.exe 82 PID 1148 wrote to memory of 212 1148 msedge.exe 82 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 4528 1148 msedge.exe 83 PID 1148 wrote to memory of 2484 1148 msedge.exe 84 PID 1148 wrote to memory of 2484 1148 msedge.exe 84 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85 PID 1148 wrote to memory of 2780 1148 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d0772943e0cc487ad7d537040a3b098_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3ad546f8,0x7ffa3ad54708,0x7ffa3ad547182⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8594103759021511317,17244669223909515543,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8594103759021511317,17244669223909515543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8594103759021511317,17244669223909515543,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8594103759021511317,17244669223909515543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8594103759021511317,17244669223909515543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8594103759021511317,17244669223909515543,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD59ad2ba742aee463329d8d0674cd70cfa
SHA1b5728540248cac197c45a1c7e0e0fc91c63cdf82
SHA256a32c6e33b16c635e9462e1fb0de6d033ebcc862a9b476f6257ed3dcfb626682b
SHA512ba20c0f81f4ddf0e1c0ee6c81cec8d840434b23dbcde57576b00de895b938c9db754b824e63cdab2744f84d4e238837d02ca788f96063a1058f704bba7d453a3
-
Filesize
6KB
MD58db57e0a25dcae05ce15eb65ae77772b
SHA1c84f78ceed58c4f7e4bf9ddbb39adf55b0f0cb6c
SHA256210655f632213dedf7d06fada263c0c93409a7cdabd23f9f720af02f1805d261
SHA512c3ad5ba5b27df1875617723783ba7d785355addd3cf26ada146cf6d69b8fef52bc9251f0879298bc33b893e6db168924b1da9498862d41855bcd6652bfee0e4e
-
Filesize
6KB
MD5ea58665e016be079791c49fe8700caa4
SHA1da1e56ef28d1fb7c1947d24c259466f095a41927
SHA25600abe281c7c8b6d40a3f66f8e919e168bc0490ad8db166ff860e0a139ff6a2d2
SHA5129c2453c52f3c9dca7c1bed354a82615ed0dcd00742c36868fae8e7fb38f816e27b60609fd98b4ac1a1314650a6b7e6e9b10cb6d93c56ae5b98b0095b6c364da3
-
Filesize
11KB
MD5f1612ad4676820786141fc53f67af43e
SHA12c73533c0028b262b327ba2c1a9e50aa90665e3c
SHA25699441f4904aceabda6ad76af75f6e94718ead1cf3ade66d57e3a316b8e785387
SHA51203a702dbb9f34ce9e7ce8bf85c764185916741daa36bccd17b0bd0067fb25b5136d0dc64cd38fb558dec9cdef473025c0a6069304b371d6b4326b7e2723170ef