Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
3c6df8658e391c8378764acd073339b5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3c6df8658e391c8378764acd073339b5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3c6df8658e391c8378764acd073339b5_JaffaCakes118.html
-
Size
25KB
-
MD5
3c6df8658e391c8378764acd073339b5
-
SHA1
9ac77c2c5b2490376632ec72b9f10caffd8e81e5
-
SHA256
27144fad12651fdc29540fcc363c987fc9f3a81b21c9f3a7336519038936c556
-
SHA512
4d63bb3b96057c9fe079b9cde8ab271f59e531a8421f609caca4d6a6b880ff4ed7d51785b185bbeb5fcc362db7686fae08c87ff0f956bde83b0f15cfd5819e39
-
SSDEEP
192:uWDq85X5q7xqNqsqMqwb5nKtWseSjIzrXylp5nQjxn5Q/8/nQieoqNnVaDnQOkEI:VQ/w/LLOY6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 2172 msedge.exe 2172 msedge.exe 2596 identity_helper.exe 2596 identity_helper.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 980 2172 msedge.exe 83 PID 2172 wrote to memory of 980 2172 msedge.exe 83 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4236 2172 msedge.exe 84 PID 2172 wrote to memory of 4324 2172 msedge.exe 85 PID 2172 wrote to memory of 4324 2172 msedge.exe 85 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86 PID 2172 wrote to memory of 3228 2172 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c6df8658e391c8378764acd073339b5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb042146f8,0x7ffb04214708,0x7ffb042147182⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,17349196511273697931,16647148544336425830,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5540 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD56b4c0ff2c8337f64e884ae625c91f03c
SHA11069bdddf2f76e000c278d5f897224d16e7f47df
SHA256760346598f3f8ef424c90dc498a5351fe4487871fa940b2d312de68eff1c8371
SHA512546f245556ea0bbae2121b98e60184afb2505cd4bc56bab46b79ece32df200c4ea212bba78f90bc4957d4d87881f6c0065611d2133061212ef6e76212ade37ce
-
Filesize
6KB
MD5b01ea10a2df2f0cc24d8d614d6eb6ce7
SHA1f4510f3ae52782865dab94b6b39a24a3a472a259
SHA256dfa7afbd1736ec371f8fb9357471e27ed1758d1bc19e1c87c0a5e97260ab30d6
SHA51289f950bc7265ffe0b484227965c9ea594733286dca3991a44062f011315fbb84d257aad4f19eb93bf05102e30964519dab75b85d5ee44eebdda50b53f2fce595
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d7e00a36f7edfdb2f4db84357d8e5ae0
SHA117ebeba331c1c16df54b7f4fe3de8fbea5833ef1
SHA25632eec2c4f426571cf12c70e676b977a0ec8cc1a6f9fbb7166019c1ec7860a0bb
SHA512832c7b814e07197d3a102bf58035853ccb7626d8af0e668c9cd0a09e3463ae80e2f9332340d53ae8195f2af191c905c1a1173aa7adacb2d5889121314448eaa5