Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 13:02
Static task
static1
Behavioral task
behavioral1
Sample
3f9c3045cd3c72b1bfd85295fdb0e867_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f9c3045cd3c72b1bfd85295fdb0e867_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3f9c3045cd3c72b1bfd85295fdb0e867_JaffaCakes118.html
-
Size
34KB
-
MD5
3f9c3045cd3c72b1bfd85295fdb0e867
-
SHA1
8a5a4136d359308fcd5fae4db95366c6bed02692
-
SHA256
f398c68b23f35c4d37c89e5282c5f0deb8137c72518f83d699179dbc1145b6d5
-
SHA512
1be06b1c398e78437b79bfdeaeaf76d61ac0daca6f383f3369f353a49630dd30e9a913ac9709b28a0de59bf4af24fb0e8d9ddbbcd7a8a0ce0c928f16b683ade5
-
SSDEEP
768:K7EpFwSXe6eDewe7eIeygjI1RCJC3CNChCICrC/CvCPJExBq0Z24HLx8lFaFn:KwpFwSuDqtClpjIXEWmyP84yiJ4q0Z26
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 4820 msedge.exe 4820 msedge.exe 3536 identity_helper.exe 3536 identity_helper.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 2344 4820 msedge.exe 82 PID 4820 wrote to memory of 2344 4820 msedge.exe 82 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 4168 4820 msedge.exe 85 PID 4820 wrote to memory of 3628 4820 msedge.exe 86 PID 4820 wrote to memory of 3628 4820 msedge.exe 86 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87 PID 4820 wrote to memory of 4512 4820 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f9c3045cd3c72b1bfd85295fdb0e867_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a06c46f8,0x7ff9a06c4708,0x7ff9a06c47182⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:5640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,10494598282643669000,3008287289357324887,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
308B
MD5bc13c4fd07bf1b571dcc431b3eb5920d
SHA1059e7d8eca4f319278409ee9ee67263b6940c8e8
SHA256df21dc4833ee2df5d302766e870c2e2e77b22d892c0e84e2a16dd9eaac37fd09
SHA512db22c3a11cee6d7ce7a3ea76062d13768579e432f2386e5fa29f74180f489e90726311e9875d7f7e4f81435ee1bb0a04d4fa0d0185ae659563988580211b2726
-
Filesize
5KB
MD54896c529233d24274580d5a79c39762a
SHA1b3f1bea441376029d95a0daf67be85b10d801cbd
SHA2565abfc096a98edf2887796d7e034973887f710fca45e5474608a88cee87a3c05a
SHA5125cb8da9bc97f64e3758fd7f211781c531d824e66081adb585a5365889d2cfc1067d05866546e55126406d2236ed348999dc63cbd90064d095aff4caf37e485a3
-
Filesize
6KB
MD54c69d791d66a1bc81e69da5f7e095f3d
SHA1017548d2b2256c2a030a7a3312ff7c67c48c268b
SHA256a883805517bcec8f5109270889b11eb35b771fbaff89a44d8e6740a47f827b7e
SHA5120c5ca3be694a3408e8c79c7bc04eac4571ee72ae1547e67818d79a54b8bf652e908a88951a1cf4518fd363341f5d5fc59d9559a1a10185124d58ed26ddb756de
-
Filesize
6KB
MD5bc1b1abe1710ab706878a42284deaefd
SHA1d568672d2850aee4c1eb47c6253c0b7accd13aad
SHA2566fe4225852cdb23591485483e10f558f0baff0f15adc651fd7306e92d79ab0e5
SHA51206c5322a59f9de2b5d1cdfe9be14160ddde87b34e4d77dfaa80f5f98aa9fb575b03346116233d1bbbdb89376dc13b74bd8650d5c1630d3037d1ae6489d9da77a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5789e9d168af9a785178d07802268ef87
SHA1f847adea2d2aa1fdfc2e2df1aa6e1a043411cd61
SHA256eec8f1cbf28cbf3ae45262ab36c9ae92d367825aad8e37fc1a229ff669c214c8
SHA51269ed117d29c3eb8dd966f93ffa468e833a3df8e2ebf0a5e7ca2cb1cbe5304182a03fbdc32148a03ff139b57731262f9bfbdb356082b202c9e998a5ddb8638ac6