Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
3f2b4df994dc011ae91d242738253624_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3f2b4df994dc011ae91d242738253624_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f2b4df994dc011ae91d242738253624_JaffaCakes118.html
-
Size
20KB
-
MD5
3f2b4df994dc011ae91d242738253624
-
SHA1
d1a2b5acd4defc0abf0d7248f023be63da311fda
-
SHA256
28c6171e5a7694be8f056330f2f21b731e36d58a367358f56527a83ceaf67476
-
SHA512
858a653f493ecd082d9dee992783125e199759500eb7b753275fcb29a1ebeb6c2bff7fa66cfdf3d223f964108c3bf5ebda1760cd382047a93cfb740a07c71591
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIpDgg2DggaDggKDggoDggk4kDggQDggADggg:SIMd0I5nO9HbsvmLxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 2708 msedge.exe 2708 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2708 msedge.exe 2708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3116 2708 msedge.exe 82 PID 2708 wrote to memory of 3116 2708 msedge.exe 82 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 3964 2708 msedge.exe 83 PID 2708 wrote to memory of 4520 2708 msedge.exe 84 PID 2708 wrote to memory of 4520 2708 msedge.exe 84 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85 PID 2708 wrote to memory of 4216 2708 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f2b4df994dc011ae91d242738253624_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce6146f8,0x7ffcce614708,0x7ffcce6147182⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15862944100460350225,15607189173126090461,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,15862944100460350225,15607189173126090461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,15862944100460350225,15607189173126090461,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15862944100460350225,15607189173126090461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15862944100460350225,15607189173126090461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15862944100460350225,15607189173126090461,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD522befbfd9c188fe3319c08d7662d6b02
SHA17da956da83f78239c3afec1135103c477057d936
SHA256d28ce7b8f0e1dc555210a9ea53f92de2ae5f4a89ccafcdaee7fcb15811df89a3
SHA512998d0336b0ece8cf71aeaaf9584fceba9219cc87df00fa620415597786907ff743fc11462c4fe6b5add03b85e5b8334c3062147a921fb42081855ee39272d2fb
-
Filesize
6KB
MD5092c738216214375400eacb6d2c471ac
SHA11501935f399c8ff016ae1b59f7b9a38f80833dab
SHA25695ade9e56e3a9699690c721e736c40f5bc76e733e47a1ace61180e6434f877cb
SHA512cc98b73809951e37820caa90ace502aab5da49b10a68b3da8aeee15087987f9c5a68735b7623312004e286a14853d258cd94909d7b5ae5c721496b6da7f24949
-
Filesize
6KB
MD54d285ddac7c6f91133b7d116230b05a6
SHA1c1b87d7bed78259b49f1df759d40d1ce736eecea
SHA256fabec2947e9dc59d40a81850801506ee450eb23034fdc55dd121453ba8434344
SHA51251456ffa9449459942367d4ca213fe541c30bedfc3f6f7c63d837a10c7f70741f7f3819afa6032cb4a2198393a02c8ff6db05130d116a4a0c193f0f93c3bc396
-
Filesize
11KB
MD5dc32eca0fc53d7c26f2314be87006dc0
SHA110473611f913cd1ad3a1e67ab6f5d762d134792d
SHA256be1460cb4f0375437c88fa1fe81540cd8ac55e762440c6a9a7f9e10f3275023a
SHA5121ffb36842f0073c4393d393f41466c6726ee975c2ff70b513a8644c6abd557ac2eb599bb19768468d49034090cc618e99f9302158d584ea780a836419d4841b6