Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
3eacda7887c2b21bdbd678c598967e84_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3eacda7887c2b21bdbd678c598967e84_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3eacda7887c2b21bdbd678c598967e84_JaffaCakes118.html
-
Size
28KB
-
MD5
3eacda7887c2b21bdbd678c598967e84
-
SHA1
346391af9b62cea8628efa21ae9c554587066f86
-
SHA256
d302577ce20f5773a2dcaa247e2c2efebd1659274dc8bc56443600995cb68919
-
SHA512
3fe4296f1e00aab26683d27ae9a5d1ffd880e9a3d80cd4acd6c53c7f640f7d6cac45bf07102416d89dd4b43aa78457ea6ed014770563481585d195cb5f44a72e
-
SSDEEP
384:js/6L6K6SfBMUzf5hGlAilQcJIMmJn7/AenVf7F38eoL2otytKF+NWqRrgw:/LtLfCGddwIN18SotytKs1gw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4268 msedge.exe 4268 msedge.exe 3820 identity_helper.exe 3820 identity_helper.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 5076 4268 msedge.exe 82 PID 4268 wrote to memory of 5076 4268 msedge.exe 82 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 652 4268 msedge.exe 83 PID 4268 wrote to memory of 4780 4268 msedge.exe 84 PID 4268 wrote to memory of 4780 4268 msedge.exe 84 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85 PID 4268 wrote to memory of 3040 4268 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3eacda7887c2b21bdbd678c598967e84_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef86946f8,0x7ffef8694708,0x7ffef86947182⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11393162432266206526,15346716436600611175,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD553db5df67f2cfd563c8a8a83b063c09d
SHA11b03b4a0958c94eef76e2b003d002870f6b026e7
SHA256d30a696de35918b81b0c02bf0db6b7d2fae97bbfbe71ad6a2aaf5b22129a8387
SHA512c265a11fc1708aa2f46b61f25d1038cb3a6e08332da43b07c0b1413fc5d84f6599a83657cf6d43eb28ec289eabdce4de944a42931e34213b5324881d6a4093d3
-
Filesize
6KB
MD52249b1c048dc209cb38520a605438fdf
SHA1c5204c61212b195b475cf2197cfd45618f11236a
SHA256aad3a819c6a21c4fd20909cf188576aff44709fdf1a923018e6faabe287592a1
SHA51223629ac8747a9228198433d6cc16710f3989147c5c40af788de9774c87767830e3be6b93c47913a4716bce9d4c710e75f51fa013c70f1e764735d46376a8d540
-
Filesize
6KB
MD5be31a1024cf59da5a4ea701dcf33c06c
SHA1f5835f11727e5c18653ed112a2f3fb1f269cfd32
SHA2567e3a7752a508badbb10f22b251da374ea6d29a9522c73f1ce1f190aa33825cab
SHA512000133d9cdef5eb8c1f0e234419a886cb1c1d3c3562ed2fe1513d997e82d1eb093293ade5878ccd210e654a3abc2d8d0c454c887301d21f5c194bdabb8f820cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51aa31b33ba26416ade9264e0a213548a
SHA1240f003693ce47fdd66c6cf4c1e81ef022e3fbb8
SHA25612b797116251677626337511131926e71bbe764e0efb8221326ccba38acc6900
SHA51223ebfe0bc17631ac357a7f26e30b39f7e221a8b06e83081217d636df5a6bbfddcfd6025e5b72a24d5bca745e939f0ab827bec201cdb9a06df65d1d13b2e589ad