Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 09:54
Static task
static1
Behavioral task
behavioral1
Sample
3ee9c2d9712fb6b0fafdb5dcd0ce1af9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ee9c2d9712fb6b0fafdb5dcd0ce1af9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3ee9c2d9712fb6b0fafdb5dcd0ce1af9_JaffaCakes118.html
-
Size
149KB
-
MD5
3ee9c2d9712fb6b0fafdb5dcd0ce1af9
-
SHA1
2d30712edf09b08b310fdcf1a2a92a072b6d7ec7
-
SHA256
1915f9af537cc7e4369f1d53d3a2978297e120e3f7b72f245f8ecbc0bd05022f
-
SHA512
f2e05f73c7d9a48a12d5346c7020e8d58550f0a078ca194fb92fd90d2f6779d2e2dc6d1f4e940ae6723b555a42a139ee135c36681da5bf214d29b97db8d062c5
-
SSDEEP
3072:a9hAqvzB4armwQULt+qR8poQItytVJBp8o+Xg9eUQtWu0HCZGj5oT/QiJhKtb0Sa:azB4armwQULt+c8poQItytV3pJ+Xg9eR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 2912 msedge.exe 2912 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2856 2912 msedge.exe 82 PID 2912 wrote to memory of 2856 2912 msedge.exe 82 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3456 2912 msedge.exe 83 PID 2912 wrote to memory of 3724 2912 msedge.exe 84 PID 2912 wrote to memory of 3724 2912 msedge.exe 84 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85 PID 2912 wrote to memory of 4668 2912 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ee9c2d9712fb6b0fafdb5dcd0ce1af9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf8b746f8,0x7ffaf8b74708,0x7ffaf8b747182⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14219293508106809066,13817126950246823867,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14219293508106809066,13817126950246823867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14219293508106809066,13817126950246823867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219293508106809066,13817126950246823867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14219293508106809066,13817126950246823867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14219293508106809066,13817126950246823867,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
1KB
MD56dbdcd018c2b337a5ef0e8dd3eef8f03
SHA116400743481b531d58f9f6b15bc8880ae8d89a73
SHA25683b3d4d964bd5b824a290019726b5424b3276d615947e668629bd24e5c62e62e
SHA512286af574b81a85081f50a4c4b58cefc5c4b137e8f5e53ea613268493643a8778b91b93182dc73ff7aef57779b75e32322ea0544934520e9384f0bbc3096281a1
-
Filesize
6KB
MD5a627fc64e6ebb5bcba9878af25526c1d
SHA1455c3090702f302e8a31a4ad5237f2eff497472b
SHA25651a3ad192bed382312e15b55261bf264d94a674468e6d05cb6ba4d0c28624938
SHA512b61eb51c6975ddeaba260ff639b6283986021e9ee26feba45382a7b8a6ae528e567e2f1892b50ffc2fc8a7bd2b2849451b02a2ff504bdac33fb92fbeeb68cb3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a45a95aa-1e32-475f-9a06-7b0d8fb9d155.tmp
Filesize5KB
MD5d4cc68715e3f93c5e26f37c51f752af1
SHA1ff51540529a2dded16e6fce4f928adcdb2c251ee
SHA2563b7613ecc6404c578e92f9f70bf39eae489fcea8d973d0a840efc31c8de0e6af
SHA512742b4e9a41bfa544d01f73b4493f39ad81021edf87674cb2cdf3108e1d241b59560223882f3b73e6b75b30b68ea7c9bd44c4d50c582feea37bd79ef09f1be849
-
Filesize
11KB
MD543a011bad9e177a4d213ddfa665f02d8
SHA17dfea3e5753dd21e4cfc883c9da4d31ece3d194b
SHA2563e381a01326d0ded35c3715ed3afa8e31bf13ccc1e0ae2622fd888f9ccf6bd18
SHA512676fb8f9cde02bcc17b4bfbdbb7c39dee5295c6842a6cacdac94d7523c767d0964d5e985f22b030976193604667e90af4649bb9d0e02c909e39d6a5fc6b3e6fa