Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 23:32
Static task
static1
Behavioral task
behavioral1
Sample
3d07ad64824d029afe9aed704666e279_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d07ad64824d029afe9aed704666e279_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d07ad64824d029afe9aed704666e279_JaffaCakes118.html
-
Size
859KB
-
MD5
3d07ad64824d029afe9aed704666e279
-
SHA1
6c45852f2e8764927b169a9496c63e138598b183
-
SHA256
8b586d41dad56435796b8477c107845fe09e69ac119bec799b4899e602f0cde1
-
SHA512
84ed384456f916ee5948cfda8d9bb39dcb2d51059aaedd6eaff8dc3ad28ecb4da7a15cff396686f679cf5dec1cb81ad5084f3e1ff3f0db87b855ef758fdcd212
-
SSDEEP
12288:K5d+X3w5d+X3y5d+X3j5d+X3e5d+X3aZI5d+X3w5d+X3+:g+q+o+b+8+Ci+q+e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 2116 msedge.exe 2116 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3436 2116 msedge.exe 81 PID 2116 wrote to memory of 3436 2116 msedge.exe 81 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 1092 2116 msedge.exe 82 PID 2116 wrote to memory of 4732 2116 msedge.exe 83 PID 2116 wrote to memory of 4732 2116 msedge.exe 83 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84 PID 2116 wrote to memory of 3052 2116 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d07ad64824d029afe9aed704666e279_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcaaf146f8,0x7ffcaaf14708,0x7ffcaaf147182⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2584 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12928118962735101114,8546268002048711946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:2144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
174B
MD5abc79ce14fd2afb7c76e211a75771a2a
SHA1acfb9849d49fa45e9f8b3116ff2b5266aeb0ec91
SHA2563e7eb43cb44ec59afaa0fd480eea2788d06359f868127dd47182cd7ab75fbecc
SHA51281f814ccd67c9fea17d41ecea570654bf33fb14bf512b25065692f1703f546827d365fe16be34b63ca775f0973859d28857f3fbcf96c6cc85f2dec343c76f519
-
Filesize
6KB
MD5177a658ad296fa21ea574b5a141f66f9
SHA119da51a2b62bd75f20faa01266cf2e56f57a30af
SHA25621b7cc0e8eff23a67dffcd71e781428a242e967ac985af39b4c980ce23dc816b
SHA51287d25204ee562a6c8026217664d05a528fabe49c45199ca34d8fef91038dacefe50885285002f570d6940e87cb2bb72297164fde1af8fbc2e0bfdb37d8bfdbf2
-
Filesize
6KB
MD59c9df1eaaa7d659f23314fd39e2ac271
SHA1557c0bbfd33f751d69ec38586f1ecedb431f1d76
SHA256559a5563a70962f4c0ef7e2c88bc9334598cc666a932f2f1af60e1086ab3f834
SHA512b960ca6afe09ec3b38a9f7a73b346ab2e2a7dc35a2dc46dd6e1cc0230e2b9c7171f3747afb93d34cebf43731a6203f9aa34a7e343e9414a45bf89966ed690f5e
-
Filesize
6KB
MD5f6ae72107dbbc1436ac2a2f645632cc7
SHA12f79d47a2b4501d055f7b2d1a913d34789abcedb
SHA256647051522d44e9cd93fba1b1afb0c7884328fce0aee79efc256b3a302243d49a
SHA51290a3cf22699b12e95e1e7dadbf9ec8bd87dc519e9678d2126a9bb72be99918a8b38f2ffac2e5666a5142243f2467694d2d2e216724a77723334e4526ca939f27
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54fb3c9fc60e2a31dcfd98ab8ddb762ed
SHA14cc7fd810ad81908b70326feb7f9e03348ad06d5
SHA256e271b466a38b6049b3c4317b8ed3637f7df3529b3a872528bdfd823b037d8e00
SHA51240172ecfbbcbb05b633a351dc7b15ce0fea808a8e0fb0e19ef57142a052693c335c370c58051a16852cf1322d290f8108d7285e6da0d012f195bb29acbbd556e