Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
3c6adb9b5a22048817e64bd6e995d331_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3c6adb9b5a22048817e64bd6e995d331_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3c6adb9b5a22048817e64bd6e995d331_JaffaCakes118.html
-
Size
10KB
-
MD5
3c6adb9b5a22048817e64bd6e995d331
-
SHA1
216553d607cafdab29e74fa864071a3f32a4d1d0
-
SHA256
557181e08ec039173a7ba8b64ce46876f167b814a3c1bbed56c6f1c45eaa9958
-
SHA512
bf3de4020be19b5b08573ba5b26237e3e03975bf3dcddc409cbb8fd388997d42dfd9835162fd46bd1161a6717c803823d9884834f761751d2a633c0f6e692a7f
-
SSDEEP
96:2PiKMxq7ZTJ659tkKBcTVXYudmsUyKuo9gh4X1CiHpvy4k6x1w:UioNTJ66KKTVX1dmWKDBX1CiHdjk6xC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 3792 msedge.exe 3792 msedge.exe 3300 identity_helper.exe 3300 identity_helper.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3560 3792 msedge.exe 83 PID 3792 wrote to memory of 3560 3792 msedge.exe 83 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2112 3792 msedge.exe 85 PID 3792 wrote to memory of 2184 3792 msedge.exe 86 PID 3792 wrote to memory of 2184 3792 msedge.exe 86 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87 PID 3792 wrote to memory of 4852 3792 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c6adb9b5a22048817e64bd6e995d331_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8699846f8,0x7ff869984708,0x7ff8699847182⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10809042786085162040,5975115096568940591,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
308B
MD545d1f46b817202b22c8262966f6f4c39
SHA19670900b89af49ea9aaa6e1ad557017e4ed70ffe
SHA2562ba70e5ce4ddd4b9c5d6e28302cee81ac06ddfd284e0c739959b61580d163512
SHA512abf03c43acb41d2067b1fe355da6862f1da6bef33ad3bbae8187d0e116d6231683ff58a80c53efe316e26ada5dca69699eb5c490143d8f3935bc9fd5c7a50ca7
-
Filesize
5KB
MD5c85600bedff43f90a9bb4d438fc736df
SHA154bc2e02e9a9e93de8e65901cd96d174d243a97b
SHA2562a63bb034267722ee5fdbf383512e79290fedf33918731336f037a1329372cea
SHA5121b37d6e1a06272bfb9c7820e1c52884bc0a905c99a1f5e93a488cdd5dd578afbea9b9a1ce50e8b9f60e1b86b06550304898a6475ea54e4e9ba20984da0662179
-
Filesize
6KB
MD50a1d7370e4b947e99fa5383137bd8854
SHA1888ecde77e9d8b00acbd10cf1aa5e6bb22d32302
SHA256628e411e9d9888d8a2ae5ce83880c3de8dc701dbbaabd6824ddce216ab6f5aa1
SHA512e043b5c1b71c6d7105c4f4194680b36f791f699ee98131fcd8f831af1cef6d3daeb53c9aa04eef64af043894106caa29b7a357a21e9015b01a322f062ac5308a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD560b9e83169884e65f0b7859d3e10d82d
SHA1316c4ea889a7d5c94416714968fb9ba23d077f73
SHA25639ba857399c71c863005f14c0cd6f6f2aad6677a95c82d006cbfc747df235509
SHA5123aa870ee660728cb9132d4e263716b9f1d99ff39652fb82df9086a5c51a020e48eeaff5c329356fe4094a340dd67c82a40068a37f1e1a68a44f56d3e09fd75da