Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
3c98eb1ec7c62e30d78135b019682234_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3c98eb1ec7c62e30d78135b019682234_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3c98eb1ec7c62e30d78135b019682234_JaffaCakes118.html
-
Size
52KB
-
MD5
3c98eb1ec7c62e30d78135b019682234
-
SHA1
a8f5b03347ee84faeec3e63e90001bd53f16e7b1
-
SHA256
0f1bc8c1788a813ab8e20f140a6ec08727d162905251335b50277084289417ea
-
SHA512
19654ddb61df6ae966a95523f83677e5e11d25b003058d52bad4959d772c022c5b163082a2b3f6afa205553dc29ef50e8c09f391f7cd9150ff370bd9184d90b8
-
SSDEEP
768:lamXdkZbzRYzRzZG0pDibZkbmh28Zr8Hdl2zZ3P8UPrpZXkIADobZe8BBmpZ3yqe:lamX1lShSdlkLzBOyP3uuUNlCKYFhBsi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 3808 msedge.exe 3808 msedge.exe 3008 identity_helper.exe 3008 identity_helper.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3808 wrote to memory of 2004 3808 msedge.exe 82 PID 3808 wrote to memory of 2004 3808 msedge.exe 82 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 2848 3808 msedge.exe 83 PID 3808 wrote to memory of 4244 3808 msedge.exe 84 PID 3808 wrote to memory of 4244 3808 msedge.exe 84 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85 PID 3808 wrote to memory of 1080 3808 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c98eb1ec7c62e30d78135b019682234_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad02946f8,0x7ffad0294708,0x7ffad02947182⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,10607517018050146331,17310559518344413723,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3432 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
402B
MD5a9f60745b593ba3dd2e66125a45e44bc
SHA11e6ad8b61946b254703b100dddce00b869d8fd3c
SHA2566a4385de0350a4dfc344d09f153ea024c238d8563358901159b80518d9c0f391
SHA5125733d924d7eaf65080a54a477ce12882ee923589bcae0896ec38d5a5f2c4e9074f564b8eef74efd35a91f3a068a049a8fc734488a6aaf39e0358d2173f8ae500
-
Filesize
6KB
MD507eab9a248d3458b98328af0e52ae7ed
SHA1d6c5d7ab870e7708bf311a836baa72514f8386d7
SHA256cd2b09625b504bbc779608afd819bce87a0ba2d1f57127b5c035316dc197cf5e
SHA512560897460812df45ae9aef4232d8606921cf039da3ff3d96918df38c31d25c8a3c91028e0666799590c664a1a945039d8157cb0189546be484d242be60efc73e
-
Filesize
6KB
MD5f8e4b2f6ec1ab8a933114932dca91f2d
SHA1578fd76543b15c809ca666e9318faf87942daf69
SHA2567d2e4282fa2dbee646fd2f867915f6065ec8a2c0a3c68681584df8297547cbc5
SHA512c3d24cc303a7f79beb90b4d80d7ffd04bc1a907c3c5f75b5eaf65252d7f05170982eb40fcb53341f8ef267519f68a00b9d0a95533cc1720a241e86813ab08af7
-
Filesize
6KB
MD5da6f14d418517e85bff7250fd3775d2c
SHA1bf24a7a7b5671451133fbd5b24b4911b7851c281
SHA256641428989a1e3deda22933bd70f1729789c277eceb175299a6241dc7f5465ca7
SHA51245cace644283ccb44b14478b81861a8ed1cc2eb406899ff5316d15f831e2cae3ce7f99d238ffaf2d61da392fcb6e85947c0cba08e367e43bb3f59c68a21659f0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD501eb960835f3bc78e19630bd877052ef
SHA103428f33c27f6d4481b06adadf7eed905e6714a9
SHA256b1189a9f5e8fa6f0a8cb73648a47de0cb17a081f1a742aff7aaac0547368d8ce
SHA51226253c30990fa9cd7891f98e89044cc765794d880f677a685048ef0f661fe3fb955e3f6a8f6abdf6e8bdb777044f0016815b30c113c49ce8379546760fc29428