Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
3da89b5643a4ae0de16d623bd8bb9f3d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3da89b5643a4ae0de16d623bd8bb9f3d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3da89b5643a4ae0de16d623bd8bb9f3d_JaffaCakes118.html
-
Size
83KB
-
MD5
3da89b5643a4ae0de16d623bd8bb9f3d
-
SHA1
e3b995eacf0be9e479eb7a4077a7b573272cec2e
-
SHA256
54d4bb4a3a36f65406bb1a264fe29ba235300f622dfef7edcec7a332117b03de
-
SHA512
dbdb4a6f4e9584c337ec8e72d758d564daa94cf8e4362cecf4744aa624e316d53fd8f31aa75f118cb0382389e2a2759627fdc365537754e8f1bf420e4f1ea677
-
SSDEEP
1536:Mzuhf9YIcNyfHJx74FFUIWeHcUVH8q7uYUDf6TXc:Mzuhf0Nyr0FYSVH6Ff6TM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1036 msedge.exe 1036 msedge.exe 4888 msedge.exe 4888 msedge.exe 3860 identity_helper.exe 3860 identity_helper.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2644 4888 msedge.exe 81 PID 4888 wrote to memory of 2644 4888 msedge.exe 81 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 3152 4888 msedge.exe 82 PID 4888 wrote to memory of 1036 4888 msedge.exe 83 PID 4888 wrote to memory of 1036 4888 msedge.exe 83 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84 PID 4888 wrote to memory of 4520 4888 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3da89b5643a4ae0de16d623bd8bb9f3d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe86fc46f8,0x7ffe86fc4708,0x7ffe86fc47182⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2208 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,4922844927826547284,17945420147663364646,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
395B
MD510bab97bab65cdd89b9be40211fc5edc
SHA1e711275eea84280aed630dcc114a0c3362cd83b3
SHA2567502c2bdbfd6bd8945704b75b00d762f769a52b84311fa6b890c18244bc91913
SHA512fcc200bfc60858bd2c33ea6d409668deb8cb293cc4c628849ed9dfd1a7397b392f215bd75903c42f92e78db86487c92e2c1550e232a70fc319f5f151beb91385
-
Filesize
6KB
MD5c3df26d0601b44b7c6740952b4061964
SHA12ed5654de901c867a4489564c26395a59ba2aa67
SHA256c3ed341680c8ee6d92ea7e335e6b6bdfbffa11f35a73533485d57f776dc7e926
SHA512d618a74430382835a3c0b915f67b0afdeb3f413fdf051d4eb9c55faeba5718ab4330c2ef350d5a76cce957b3b8b9c0e26ef452838daf60f7d59eb40e7684418a
-
Filesize
6KB
MD555b807247e294707b74b055be717d354
SHA190ff05f6a16a4c3d4c28404e51b308f8b5f575f4
SHA256d1fb4f180bfbb67a06dad6fa320f337077f22db849a0389b4e1e9e80c0beb3c4
SHA51259bc6fe7a744ed590b3e9c87a24bf7962e8e35cc32f964b36922140f42ebb711750246ff5547f16a075cce81e08c12a2a9366dbdff470658d86fbabc44b55869
-
Filesize
6KB
MD55bdb6bf3bb5104d846454b0e2cbc3138
SHA1b088280940c2609a82c5df139e04700bf0bd5cac
SHA2563529550c915a33a211d9d602264ef8f98e171310cb97400a04e7c29d13b2ebe1
SHA512a7b719a4453884a2d1b12dc857ef21fdabf95fcaf4d725f3c8d2599d694f80dc7d9440990bab16c50a4421cab38cbdfeaf4f9e15cd1d25761fa513ff680a2be7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fbf8a82355c35fd32dffd6646e1ade3e
SHA163c7bb2e51fed7306456ae8937ffc97c130ec128
SHA256cc639bb61e30132a886d8173f2e6ff20d1992daf0a7dd0a7f9174eccd94256ab
SHA512cc21aca66be897513b9c7b59b90fe09afee4f42847678561580d88e2bfc7ee6aef2155607f137f705cb0781b874dc331d95567a33d90d051efeda01b17b3632f