Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
3c75c75b1fd30f193ce533501ef02bd9_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3c75c75b1fd30f193ce533501ef02bd9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3c75c75b1fd30f193ce533501ef02bd9_JaffaCakes118.html
-
Size
17KB
-
MD5
3c75c75b1fd30f193ce533501ef02bd9
-
SHA1
56d363eaaca38f076aef3083669c2e62c547226f
-
SHA256
5b64435d46b32535f1c74711232c1fa2bb2105e0e4b8b14670d228afe5cc3dff
-
SHA512
8de4883e00111fd9f6038643296d9af780120740c7454d9acdddc8a279e8daccd217ea446547444a672db9541ebe06d6f9b31b3daa198a8de29033311327c7af
-
SSDEEP
384:GBKlf7HCVk5Jpqmb0xfv4CAivuaG8LcWOxD1AEkPbW:GkBfvvOIdoXvLVmJAY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 4080 msedge.exe 4080 msedge.exe 1076 identity_helper.exe 1076 identity_helper.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe 4988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4080 wrote to memory of 3248 4080 msedge.exe 85 PID 4080 wrote to memory of 3248 4080 msedge.exe 85 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3496 4080 msedge.exe 86 PID 4080 wrote to memory of 3724 4080 msedge.exe 87 PID 4080 wrote to memory of 3724 4080 msedge.exe 87 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88 PID 4080 wrote to memory of 5080 4080 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c75c75b1fd30f193ce533501ef02bd9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffd329346f8,0x7ffd32934708,0x7ffd329347182⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,15573724252786327395,13498464358456432583,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD5df8eab477220f9216fa2b39fee385275
SHA1ddb6e3f5ee1553ba759c20e0ceb8208f4aacca6b
SHA256c9046aefd4a1d15cae5b34b2d3839116188e6c87e1ffc56fc811e70a27c673ad
SHA512ddc4685595038a01415806092ee5bd06f7dcfb60dba568bd7b1605c6407e52bb194c9d3bfabe9bdb4dea45d8a55315eacbd0716f79df3509611cd64d315ff484
-
Filesize
5KB
MD589b376f764c30de15493e1afbc37cff7
SHA1ef9d397e8036934631716b27ff800f7eb6d9c523
SHA2564f6e22f7fe646fd4fdb717a6427b64afdd411dc96e1db2bdf727eca29fb62ad8
SHA512e41c29768d0943ff4f00fb68fc52103413c2c368d08272cf088e993c3fb2afa62f61f0db186ddb41d495ece2904882d8c05532dac478ebbe943f8c5f3ca97148
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50d4c239d96f51b9fe3c58162f6a957f9
SHA1f46347656f6b3a9eff71125bff2f93015f6c6a77
SHA25690d1e5a9a9faf4cbb49529ffe6625d687eb51bfae6ac8901192b6b0a39313318
SHA512678d51dc5c0ae2f2e738cfa9ae2cadd13e6863da4769a4e0d7bf348b68e0c9290a7db13e1fd67e3102c7e3bcebc8e4ff8aca4626390beaf9861e0f6e4dd49577