Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
3d3968b6a69baa62858f674d3858bc18_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d3968b6a69baa62858f674d3858bc18_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3d3968b6a69baa62858f674d3858bc18_JaffaCakes118.html
-
Size
347KB
-
MD5
3d3968b6a69baa62858f674d3858bc18
-
SHA1
42d3ec50be11277c73ecac45c763d4cf724fd6fd
-
SHA256
1174b8ebb57a973df4fe1839146b848434831c2cab8ed532fb403342d7e18a7b
-
SHA512
d5e805b208053433067dba514da346af20c4337da299ff75e0093e85a332d5a35c8a3ff8011c15838e58c3f70156c2798134a9831cab0c343972c04b8c4e32ea
-
SSDEEP
6144:Sr2XsMYod+X3oI+YOsMYod+X3oI+YosMYod+X3oI+YQ:s275d+X365d+X3o5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1508 msedge.exe 1508 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4364 1508 msedge.exe 82 PID 1508 wrote to memory of 4364 1508 msedge.exe 82 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 4212 1508 msedge.exe 83 PID 1508 wrote to memory of 1424 1508 msedge.exe 84 PID 1508 wrote to memory of 1424 1508 msedge.exe 84 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85 PID 1508 wrote to memory of 1004 1508 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d3968b6a69baa62858f674d3858bc18_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1ff746f8,0x7ffe1ff74708,0x7ffe1ff747182⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,12501407818930951963,17307298695945570484,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,12501407818930951963,17307298695945570484,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,12501407818930951963,17307298695945570484,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12501407818930951963,17307298695945570484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,12501407818930951963,17307298695945570484,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,12501407818930951963,17307298695945570484,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD5eedc69677769ab64026b5de79fd36e59
SHA1ba824e10c5c5de9b03c66d4cf63e661d3ea5b75c
SHA25654d5ca30f24c84a50695f487dee978585088153741b0bbcdb930cd5e5c7aff9a
SHA5126bdc6eac1381c54bfe800474f48c6bafe9d6f766edef5d4a0241258a6fd850cd3e4d24beacd61b8961a9981017bf854174a8c8d38599563f584a9b11821620e7
-
Filesize
6KB
MD5d6e511ee70256c315ba645ce634b5e15
SHA1a68d4f2bbc29764d4767843c8a1f9c2f44115b4c
SHA256cdb3cd1ff17477c6987b9f3e979127ad1da866b0fa9e457600a418ac28d1265f
SHA512129492a563e728130e3f83acf69471c3c7659ea07454f3412cf61632b71618b376ebe6d904794bf2a6ab1326dc98dd8cc9b09d5a2232f305ca9e39ea380bdaf6
-
Filesize
11KB
MD5819a325968c1ed497ceb54faf39f5a4b
SHA13137101c396db91edd32a0fbc7d509099e4e2c17
SHA256ed97f3b24a6e166450bc73de4cb0e21c7d7f1ae6c382e2e5f155028a51042ac3
SHA5128a6b44fbbf480cad545ed6fab149c12edec7d7db3fc0d3b317fb5cf51aa9269b40d988b5a7e1cf1d813dbd3f19c82b80653ffe75f3def0604afcb7ee6f0183b4