Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
3e86cfc86192a3acb7227d547bb51616_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3e86cfc86192a3acb7227d547bb51616_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e86cfc86192a3acb7227d547bb51616_JaffaCakes118.html
-
Size
207KB
-
MD5
3e86cfc86192a3acb7227d547bb51616
-
SHA1
b763789fa492d7db51e82f10486b997faba13509
-
SHA256
a2838eda304906750c97ef90a59903fdd1c612882a418c59e44824d8e219e611
-
SHA512
e0234e8b8eee4759fbe3d4b0b0775e2fbcb5ec1ac92dfab7d4073e29087be1f94deb73c4470078440ee0660e63a5ce55961baf0459ec70b1a3ae042f6e440fa6
-
SSDEEP
6144:P530DH6NEQwjcHXxQRVufJc/09O1k7/5u:PuDHQmjcxQRVufJc/mu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 64 msedge.exe 64 msedge.exe 5000 msedge.exe 5000 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe 1252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 3572 5000 msedge.exe 82 PID 5000 wrote to memory of 3572 5000 msedge.exe 82 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 4156 5000 msedge.exe 83 PID 5000 wrote to memory of 64 5000 msedge.exe 84 PID 5000 wrote to memory of 64 5000 msedge.exe 84 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85 PID 5000 wrote to memory of 4692 5000 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e86cfc86192a3acb7227d547bb51616_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb340346f8,0x7ffb34034708,0x7ffb340347182⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,251904741632424394,2113901340871911529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,251904741632424394,2113901340871911529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,251904741632424394,2113901340871911529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,251904741632424394,2113901340871911529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,251904741632424394,2113901340871911529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,251904741632424394,2113901340871911529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,251904741632424394,2113901340871911529,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
2KB
MD5875239a117163203608c0041daeae256
SHA14d2b3a3891a7d060042be67389b967b1289bf0e3
SHA256b247acf1c8b5bcaccee9cc24bd327b994b003c283b30bf398e467e8961a1153e
SHA51277e38abd70d38f85a3f59d495473f9bb48945ea101c11f38e861d2ae2d868a32b9f1834dde184bfe29490be27c22ee7bc48ee013d4c4f7f46c244b94572fb287
-
Filesize
6KB
MD5304402cdbfba1f7097ea090fa5c8bd74
SHA152ac893eafbb4055118854e2b8d7238fd735426b
SHA256b56dda6abc9d15ca7cdddfd595e5fc08a538c4dcc39c220015716ca4d9c6be03
SHA512d0a61d571b02325d4964e24b631110d7bc2b96525296987307f997f77afb42e2f78a964e99c1eebacc4f8a84175739d0a42b6e99607133a06e0257c0ddc4eb9c
-
Filesize
7KB
MD5770d2e413c7a27005afde73de242bbcb
SHA1db50bddd51ef348a1a610b0a6bbc5b5a145303c7
SHA256cdb0acc64d1345dbcdb81cc49ec19408b0299a2e9caad6f9441fe15c2f288ce0
SHA5123ebff5756b3e70775baf4c44e0ef07cd6efe6e2c2c54dcf775bf4bbba56d2391ce063656ffcdd106405808bbdf872ea6e99393159405c233f07bb084c2e659a2
-
Filesize
6KB
MD5f64804964a4cebaa830f03cc644ee0a7
SHA1cb208b489b8139f6a6c31e178a167426d52448f5
SHA25632c862c12e6bdd3931657366b74d181bb396e56655deb9b5bc51673f85018670
SHA5122426464a60211a6f567519ab67835fc6fe4da73e30267e73079a2f059d57975b406bd59d7532d75e6f8d9d9d71175fb8be76f0e5a3dc921b379dbf981a659625
-
Filesize
1KB
MD5d5363be01e0161ad3deb2b451dc81d47
SHA13d2efa8b31d68b2b6942ca4449b8b0d8b41edeea
SHA2567bbbc52d483a24d650c9920ed130fbf45e02f4e12b07576bf2d3231817437881
SHA512e08b2bf0772eb6aa9ca949af273bdf2e55ac4c9ce39b251af715d4745b5e5753bad7c2d51098470b7303600be3850b02f3773b1aa9e90c864c0de35a9095861c
-
Filesize
707B
MD5b1d44ae5221496d47ffb8c79d1eb6b16
SHA126d5e258ddef95d14201692f14c6f823b0df7b87
SHA2563d29cb336988ae3377d4dae20401dbd84cb22697ff382bd8d13e0437411bd8cc
SHA5120695b6e4f2c600cd57abc1964e30b222455ce743db4e48016fdc3fa4e3e6792aeaa8cc5f6c00b157c46589b1b14f0cdf958c23fe2a0b0fe9748ce6742c926ada
-
Filesize
11KB
MD5a54744c5daacb48eeb5b9f8c101868f7
SHA138b7e435a4cd30bccc889013c609c42ae7941a95
SHA2560caaaf67ba8a55f8d72c0b1815f4c4dbe1e08bab055dba7f1a0706f624b67d2c
SHA512a78b71b04dc5094dee0a3f99e4a35f08f9a88cbd6fd39d2a011fd07e57563ad2ea7b1807edddac230c2433a122efc1a2b9c769607f6ce98dbfd0165978a79fa1