Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
3c2e47837e9a60bdb1dbee74805b898f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3c2e47837e9a60bdb1dbee74805b898f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3c2e47837e9a60bdb1dbee74805b898f_JaffaCakes118.html
-
Size
139KB
-
MD5
3c2e47837e9a60bdb1dbee74805b898f
-
SHA1
eb7c53bf52ecd31a94ef297ba052ec320cf65a86
-
SHA256
324a89fb2e3a6f4d450495e0e96f227fbdabf0b7a62471ca808a9a47076b194e
-
SHA512
562693a47dfe79b6ebbba600bcb2e5bb76dbfff66a7043e3626741c0951834dd03536c61afa23b84e98274cad4d6f427a7f9a33a2301535d6aaccd988fb1c269
-
SSDEEP
1536:S7NFg2hDlKyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:S7wyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 3024 msedge.exe 3024 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 4700 3024 msedge.exe 82 PID 3024 wrote to memory of 4700 3024 msedge.exe 82 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 3084 3024 msedge.exe 83 PID 3024 wrote to memory of 1444 3024 msedge.exe 84 PID 3024 wrote to memory of 1444 3024 msedge.exe 84 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85 PID 3024 wrote to memory of 2596 3024 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c2e47837e9a60bdb1dbee74805b898f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef99446f8,0x7ffef9944708,0x7ffef99447182⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11548654042422821425,5279869580341349326,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,11548654042422821425,5279869580341349326,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,11548654042422821425,5279869580341349326,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11548654042422821425,5279869580341349326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11548654042422821425,5279869580341349326,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11548654042422821425,5279869580341349326,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD51086aa03db82430a21676f6f01eeacff
SHA163fbd0bcffd3d3dd595ce7d021b5015da53cc511
SHA2569ea6eb02c4f7bb09233791a69b5c18ce1fd3ed2eb7e7767fdd6f48e1d3d5bcb5
SHA51226d167962e58ee0258993158421e71f1781de3030aa0e336de2d045b48bfe7e0cbfbfdb8aecf2383e6cd5b325a785e76abee6714f0a5933d44056aa61fc62ca8
-
Filesize
6KB
MD5e65dd4e6cf5cfa0567e2717aa78dbc2e
SHA1b56f6cf3d60b2cb6f31f4aa47ec508e571b80212
SHA2560cf4a5f8eb93df4758addfb702d3c2518a88a95d8f1c49238d6730af8618c3ae
SHA5126b422d2d55a2f2f515f595d3b9d1a7fa8fe120d1969fd1633160db08ff5ecf9cbb8b5509b2a230f442e8d92916e8350383378b070b64a352cc1469d7b63865e7
-
Filesize
11KB
MD5c60e379ce833df806f51a2b6c37588b7
SHA1e0644efe7e1e728b62226c338d5372b2da37f819
SHA25647ea2d5d7bc0e264323d450d4700664bc0a7d864516c3dcc7c44013988440ea4
SHA5127c7ff73508a420bb4328e05ca9093f928e15428c95c845cec08985885ac5e484ef727ae51755d39cb9cc06432fe6f6b4019e8b27b3266dd894a938e241aafbda