Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
3f20bd8389261fb04e08cdd80e7596dc_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3f20bd8389261fb04e08cdd80e7596dc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3f20bd8389261fb04e08cdd80e7596dc_JaffaCakes118.html
-
Size
25KB
-
MD5
3f20bd8389261fb04e08cdd80e7596dc
-
SHA1
6000132697763d3d779beb93f3ece6091574e119
-
SHA256
347653562b25d793b18d9071b997b8fd0171593c96871468ea11a8b0f82dd1b7
-
SHA512
b8fa13a510144ea78519ba7009e4ee6421a5134148d05abfc7c39e12f5766d6ced129de3293dd26c55c25f55906167410da839b72fee5edc42cc3f32a92725de
-
SSDEEP
192:N0dozZ2b5n2nQjLntQ/6nQieIndnQOkrnt8znQTbnAnQLMC7A4pdEkwuXMAnFnQP:SdolSQ/MKVBG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2984 msedge.exe 2984 msedge.exe 1012 identity_helper.exe 1012 identity_helper.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3916 2984 msedge.exe 82 PID 2984 wrote to memory of 3916 2984 msedge.exe 82 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2364 2984 msedge.exe 83 PID 2984 wrote to memory of 2188 2984 msedge.exe 84 PID 2984 wrote to memory of 2188 2984 msedge.exe 84 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85 PID 2984 wrote to memory of 4192 2984 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f20bd8389261fb04e08cdd80e7596dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffa63f046f8,0x7ffa63f04708,0x7ffa63f047182⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3940 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13646099294449804733,7140051909075657027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD5a39060e4918cac038285c55e4dc10e81
SHA1c4e3a73b49c71dac31b52a8748ca6da9ad23d2f8
SHA25664c5e02e9d0520460ba0fbc65ec523d558e2185de140e3ccb90c948df4b2bc17
SHA5123885169dd418c19bb8d79961242c7fe8cca7436710d3b385c60c93e483006d7232f2d2cd8e7ab4dbd5ebc2d7678999772865f807b98850ec578b28f4349d1e85
-
Filesize
6KB
MD55da785ec5044c68140804f7bfea37de1
SHA12f39e783765781af146bea49f33b56955385d054
SHA2563cb243dc25a80df256be1a57960278a3823fef8828d87dbcf220ac80e5b3a1ba
SHA512080a8bfc649d3357bd616d78d39fe106ad4085f3162a362700cf4ac62e59b99c57c00ca76b038cb1f94814d4fe57244d0b23a18c8f4dc4adba00fe3822704618
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50b66e849d5964e3db9d094a2ccd4b756
SHA17d6d1ecb38f9854c46e7ff3b6de78fc140831abf
SHA256ea3344f851e6dc08f23c16d344b63e9b2a2ac229b6e0b4d17b0baa735539428a
SHA512a2b3bd68d7fa89f2c921bc23b41e289cdc06bbcf6cd7f8b9fcb6fb4b2b247f98a5f332f3d70bdb835e9ed90e683a42959b7e540df795a658dd35bb66d99f73cf