Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
3ef79c9263914d7ca77c3b1f5be10446_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3ef79c9263914d7ca77c3b1f5be10446_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3ef79c9263914d7ca77c3b1f5be10446_JaffaCakes118.html
-
Size
45KB
-
MD5
3ef79c9263914d7ca77c3b1f5be10446
-
SHA1
87a179f3e9d937c3d9c0124ca7acf87eea0c6abf
-
SHA256
195026760d368bcffc00b0afdfab12fd7171e956a1c509bdb3760e93ec5937f2
-
SHA512
4f989c529c56acdba1b71b5797e167d13f04f41bbece99eed519525c41ce197821efea5de6b898c630df05c5784a2c8e2669c5129745ff6258d599fa5aa2e9b7
-
SSDEEP
768:IDWqWbfW1vgO518IPmjkvOi5rprDaijgv7Hp1BnKqoQXCc1u72TeeyVUhbj7Qb8F:IS361/518omjkvOi/aijgv7Hp1BKqozc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 2228 msedge.exe 2228 msedge.exe 4548 identity_helper.exe 4548 identity_helper.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3324 2228 msedge.exe 82 PID 2228 wrote to memory of 3324 2228 msedge.exe 82 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 4364 2228 msedge.exe 83 PID 2228 wrote to memory of 1204 2228 msedge.exe 84 PID 2228 wrote to memory of 1204 2228 msedge.exe 84 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85 PID 2228 wrote to memory of 940 2228 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ef79c9263914d7ca77c3b1f5be10446_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa805546f8,0x7ffa80554708,0x7ffa805547182⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12965018770218862211,11771207042466395835,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
181B
MD5bb4e20b8f76b46086576ec9ef322dc53
SHA19680b48e391a4979928b00af1f9a6664240c5da8
SHA2563394ebfaaba18181bfe1ebeeff76edc8cee4b6e395a1bd79d0be20a1f4d19b40
SHA512595d871110c38c8554c940ef64c97225621a6f73fa1231713e945e0dd593b13b0adb22e258d1f231f93dd2c1264cca2951d775e6890a227025340d6f9eddb394
-
Filesize
6KB
MD5056a358bb01336d05a79e3f10e18c01c
SHA1a5658145d91053fba622bc38356309795e6bf231
SHA25689122fff387159ba5d3e98d3654d08801a295c51baab9e9f324e3860c77448f8
SHA5127841b22687a2bc0ed57b7cb377894a22449c69692dbfa2b9c5edb1ac8ee4631013c8ebeeb88b42ab0aceeafb6e333c976e51081a87e98a51802e046f7467c5db
-
Filesize
6KB
MD591ae1058615206c591843c1484003d72
SHA19614a881c6cb5b53a0772f74d16587ddbc6fffc4
SHA256ce3f525b8249e0957d1aa7b94587fdb76bcdc6bf664ffd2e010c71b0b18347d6
SHA5122b1d49850d01992fa29bbafaeb59d7e15fdec3a861bd84ed70092f5617d2467e0b945bf3afefe1bd47040517ae5ea9d08b259a8949451a91c887e19e61cf710b
-
Filesize
6KB
MD5fa2467be6c062bf13d702fe61dba89be
SHA1336ba1c306f6b624aef5667b68558467a1cd8048
SHA256e9b5e56e9ad807fbca42f6e1c22194e75b758bb6fae9b75b26aa2b7234cd0b43
SHA5120aac228d6c41b564be30db2ed62661bc3c0446dcab61edb149219eed72679e941e540cda98bc0a9aa7c74af4659aad9723d461f2fc74d0a9d565fdf9f9bf5a64
-
Filesize
203B
MD5992c62ed2d78d165b643dab12acabbc8
SHA1ea715a81d2f719ba720b46185782ad8db53bbe49
SHA256dec28734c4a29dda702b18869cd421cc416017e79e3f4fbd69de9b2873a16a90
SHA512ecb2c840b8f659169e89c94a7d72d12df636768835ddd319f375fdc069dd8c1ae9f62b8f80e56945d247c8807337145783a8d329e8a77b0ff476a1d5887ec8e4
-
Filesize
203B
MD59491ae904ade12d6661f66c040b652c8
SHA1374a686a06d19e49a4ced5efb3929e76cc884870
SHA256a3b11f0ada0330ce7347621fb016c1748ca67dd5a9d633272a6b2166d42468d8
SHA5126ce46e3280e5a85233711489e02ff6cb1123caee811cf57eeebb5661819f30b96f36cd9c7b46bc184eaf4614cf5c8a9bea770027e74ba80312cbe9ca064e3d7f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD546a20b19d6857ea120f5aaf6f6a21d1a
SHA1325ca78cdeebfb951b6c8aadbc5edab45da1b2e9
SHA2567b85a06a9cbdcf695257155e296f9da64f04f5eeba16f87194ee81cd33ea69d2
SHA51219feb238b87cfea8d3d20ed3deb5660b7e99a004ba44d58eea351dce6b9a473210221acd8bd9b474df7fa566e9b036e673fdb2e6ef484279f6a124645ab3eb40