Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
3c57e31475df174bcefb18dd65f048e3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3c57e31475df174bcefb18dd65f048e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3c57e31475df174bcefb18dd65f048e3_JaffaCakes118.html
-
Size
36KB
-
MD5
3c57e31475df174bcefb18dd65f048e3
-
SHA1
8ef2bd4816e8d8a25398b07557a84fb3651fc049
-
SHA256
32ea7f35f9dc33b8bc68850b0afb91485ad0e230ec71d60c18ecb89ce1a55e4c
-
SHA512
93181cff3905df7f2736fe3e90a9a0a33cfc434871f1b15782a9c4f82ca93d7bbcb1f695a75a100882fe9574e64bfc191c3b8de932a90be7131f489c4157139d
-
SSDEEP
768:zwx/MDTHS088hARqZPX5E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TDZsn6pzyt64Fov:Q/DbJxNVDu2SY/t84K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 5976 msedge.exe 5976 msedge.exe 3636 identity_helper.exe 3636 identity_helper.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe 5976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5976 wrote to memory of 4500 5976 msedge.exe 82 PID 5976 wrote to memory of 4500 5976 msedge.exe 82 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 3124 5976 msedge.exe 84 PID 5976 wrote to memory of 1020 5976 msedge.exe 85 PID 5976 wrote to memory of 1020 5976 msedge.exe 85 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86 PID 5976 wrote to memory of 6128 5976 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c57e31475df174bcefb18dd65f048e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa12ce46f8,0x7ffa12ce4708,0x7ffa12ce47182⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16837250876935964454,1598974027627605433,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
614B
MD548b785f611218d91802704ddb46b7620
SHA1dc29a44f3dd6d8607082fb574440c2aead39bde0
SHA25633c8a5976972ceb56f4ee43cb58897f46e8bf0d79fa6c3400265a4765c8c9a1f
SHA5124c6bd9a7a7559301ceb9b5e547d3e2590f214ef603e4dada8d158f1bc686099739b107013798d37ecde973f5541b67130a2947aee94a588666de37498ed5c6eb
-
Filesize
6KB
MD5ac031504307a4bc043ef0842f12a5aef
SHA18b7d9fdf835ad9b178ef6a8c273724fce3597d56
SHA256e25893eac973a6efae70300396d8a68b7520c7729f23856e5b342844cf8a6169
SHA512bc56ddc570649b72019950460d33218563f4fa608570d4583879d44b460a3282e3d5acfdb803a0ff6191268e531b2604d90151d350b5ee44d98d3688dc0bae80
-
Filesize
6KB
MD517a579f90f65e7b27714877477459c80
SHA1fb44338fe91099ee97bbadba38545ab166bbcb00
SHA2561a0fb634b5424160eb3307001082e6e5e5a5af4456e1e15b19553f511795ceef
SHA5125a33cc1f86d449a4732c2114d74b2b77640c4c10be064710798880b8b44339588fa484761b8dc94554adce41bc4cbe79c07c9fa213cdfb5ecb8c3df6dc02226c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD590a946c37f7548a3865828d9ff49e8ed
SHA13bb3669706c4cb5b001f823566d6fdd972afbe3e
SHA256c96aa0e10fd5303d4a5d41a385784d66155673117b5dc8a18371ffe8a9839857
SHA512f2537bd00807408259bb27345bfa80dc25fc6fc7188d19e8a54ecaa1321674c04ec2a941b49dbd840366140e271f26058e2ae503fff35eddadce45d42ae40786