Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
3e7334997bc9f697443714758dcd6df4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e7334997bc9f697443714758dcd6df4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3e7334997bc9f697443714758dcd6df4_JaffaCakes118.html
-
Size
112KB
-
MD5
3e7334997bc9f697443714758dcd6df4
-
SHA1
97be52dd5c47254ffd76429c3c50ba3e4d7956e0
-
SHA256
1de78ce7fb44621b438e72ae437366c1123e07239cefe4eeb402a7c7ff7aae99
-
SHA512
dfe98b6185cdf7f85037bf29f64bdea681d51ddd506f05be5eb3cffcdfd737c9ac203c7d07cbb5ff1fc48ee1cb0e58478707872b346e3463678822b39cbd5d20
-
SSDEEP
3072:PIM1sDuHI0YW+MyS++Py+PD3pDC3r1BrpCe5YBM1sDuHI0YW+MP3CAKAo1txRzTE:Pb6P3CAb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 464 msedge.exe 464 msedge.exe 1224 identity_helper.exe 1224 identity_helper.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 4232 464 msedge.exe 82 PID 464 wrote to memory of 4232 464 msedge.exe 82 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 4712 464 msedge.exe 85 PID 464 wrote to memory of 3260 464 msedge.exe 86 PID 464 wrote to memory of 3260 464 msedge.exe 86 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87 PID 464 wrote to memory of 4800 464 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e7334997bc9f697443714758dcd6df4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe41846f8,0x7fffe4184708,0x7fffe41847182⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8133591458702224982,14772686776339299335,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2db86234-82e8-497f-99b3-b45e873b8a6c.tmp
Filesize6KB
MD5792241a60b0bb9d4cda03048242fb4c2
SHA133d0c8051758debbebc220bf2e29e44b21f2f024
SHA256340cd4d03becaef140af7262e6b731e8f1cecfc13478f1e4ac5f46214099602a
SHA51254975e21502fad98ee21cfa282f742a99e0f06b27cbed910dce3b66c8b6bdae67a26bd5e127c3d9381886053324f6a041f5d83645f3ea7c28f7a798ea011be84
-
Filesize
451B
MD5f0d79d5f5222cf4495b9c9d2ba06bbe3
SHA1c8d7101d503f101ef9e34a16be5ef3e9f89424a0
SHA25651679009974f108ea14ef14ed7beb2aed9bc6913d6cdfb8f6572c4171c5ec946
SHA51210b4afe61749ae7ac6e98ce0a1d95eba24c97e5b61216935430eca2fe29cdffcf180e43a42b316b200b9bc15594ce87aa484a03aa36df4ff1b4bdc0d31f02a2f
-
Filesize
5KB
MD54db41f6e5911771babd2feca3127d781
SHA107a08888848f88aceff6b62f37d1f8457a6ad1ba
SHA256bb6e5f4312866e78b4ee563cf73705d6953727070fbf98dd800f1c7f3542cf93
SHA512f41bb72d81ebfa187229771f1957d81acd11b2135a8cabe0cfed86aaae956953cf29669263070382a4cb90e976ef2d8485ee93d3974d18d5e6fbb6ccf17202c2
-
Filesize
6KB
MD57d7e45f676ec0a03ca01a388b4e256a7
SHA15119fee564ed9faa1b0c7c4b37dd12618967b418
SHA2563a99f9fb8f42ca03f1223194dbac108e0fee5fb70d181e480f747aa8ba504490
SHA51253901d110962398116e8027c5640ee5ec41cb27b195c354eaa7279017aed9c48b6d0d390180b4ab3675be93d9bc3743259b832f18fbff3a118920f0d5c616ed8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f5522d41de4f2f767a96dccad4fe0640
SHA1589d48e85a0e61ed5a11d14fec23f92fdc675603
SHA256ebfd38d3613c58e6a46c46092aece3b7899e744cb0629cb881e5cc0d50a372e6
SHA512f337f00fb01b386d2f0548b3c748a3b3e2bebf74ec343f7e779cdf7cc98d76dc16faf0002db6162263055c3df2d2757cf07a270c5b21e2228de31bcbc7c94e7d