Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
3c5d9332e3471bbb5112cc1e978768c8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3c5d9332e3471bbb5112cc1e978768c8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3c5d9332e3471bbb5112cc1e978768c8_JaffaCakes118.html
-
Size
138KB
-
MD5
3c5d9332e3471bbb5112cc1e978768c8
-
SHA1
f63359ac4b4ebf0e29d55c76502947a83ea95053
-
SHA256
ffd3eed3745b036bdc90f6d20024eb2936bc642980af96d023d868284011858a
-
SHA512
a82d8910b898b66eed37c935913e45ab0317c25fb81c7536398ba3914299f85ae121c6c1ea80db937281ce5c270c9b48212ac26fb9ec2ea1c0660632fb402e00
-
SSDEEP
3072:Lqf4KELEmrORPCL1VTRUyJBiH1kwYF3Tckd:sELEmE2VN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 4876 msedge.exe 4876 msedge.exe 3472 identity_helper.exe 3472 identity_helper.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 212 4876 msedge.exe 83 PID 4876 wrote to memory of 212 4876 msedge.exe 83 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 1504 4876 msedge.exe 84 PID 4876 wrote to memory of 3776 4876 msedge.exe 85 PID 4876 wrote to memory of 3776 4876 msedge.exe 85 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86 PID 4876 wrote to memory of 3016 4876 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c5d9332e3471bbb5112cc1e978768c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90ebc46f8,0x7ff90ebc4708,0x7ff90ebc47182⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13332515971104021917,15358156205968121626,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
936B
MD51151747f8f1e29835a63704fa0411d20
SHA1b83438e173d71d74a3829f6ff79136a33c4a7d9d
SHA2565174d454e419a338754431ad76973e73fd7b97147bdce0b28a57e315d87ed709
SHA5122381204fdeb44b27eef39acc7c6a688cd9893f014302694ac9289f1e716f8246d2036ed7ad6fce95eb247fca7da99761f483bdd5e0aec8080a35cdcb5bf1deea
-
Filesize
5KB
MD5b9129b9c9c9a2cf07d62c5f73b41d531
SHA11199c1ece5fff5debd90f6803d2184b51886650e
SHA25636f09ae58b6082d857c626003980422262bcd53fda320103ec3c1dbbcd0168db
SHA5125ffcdd2b8612cfc34451b169c1f3439a2dd14e392453e94d53e6fcbac3a1ca5a8e8492c64145ca9cc4c3099a9402272fbf4a98f0b5a2392d1dbc43791b4bd0fc
-
Filesize
6KB
MD5ebb4a8035c15c99812d39d60ac2e1c13
SHA1c92828fc61f87791bb90aa9296e1bf58a181b23c
SHA256ad2dc0c74fa2b62251742d4dfc6f66a7fc2f3d2a64fb4a24f48bc33725bb8d5c
SHA512d198f92633bd588f4fd51131289c5011ffb45255e990e684f4b8d33ca90ef747a10c7530a3ff78b912dcc2705ea8ea3b8b882b08861bd8a2539e96c25fd38cc5
-
Filesize
6KB
MD50dde21e37264bb83edea088bc7ccb20d
SHA1fc37ca3a3bec2523a9151c1d2ffa727ba9342f80
SHA2565b4adf98dba8b819aec30b04b4bb8c0be032b0b22c2e4853a954813ffbbd8e26
SHA512550a44a3573c2a4aa307a7a2077a8ba5c4fd946915e541b3143183fcd290e8234484a5e4a28ef91cdf01120b669eb03024cd33dc827d426de88cdb086b9ff582
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5590e613ef28b1e0433aa8596f122ab68
SHA113f48b901063e90136255e04149520a90b1d8b99
SHA25607b7c53f6404b9c80a97f73ec1966a04ed1d6fc000ef6003d2f5203f7262167f
SHA51289e7080a63b1cb1d92fbc4d9a1b4bf8a68d6a5244653ae1779eb6092632119ff1b891f219e5b803236b9aa38aebbfe3d71acfd579323d25faa7ff2cd06f3e5c5