Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 04:35
Static task
static1
Behavioral task
behavioral1
Sample
3de619f4a46ea730b0806ec35efc0250_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3de619f4a46ea730b0806ec35efc0250_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3de619f4a46ea730b0806ec35efc0250_JaffaCakes118.html
-
Size
28KB
-
MD5
3de619f4a46ea730b0806ec35efc0250
-
SHA1
e3b52e96c17eba7d2dc3100cbe1e2b17b929cabe
-
SHA256
40fe1d271ed69f605d28e374a9b658ed3461d1b1c4f53ad9e1f938d128a3b90c
-
SHA512
d19b4d9416f4a48fde6097b084e1891bc124352297c42ce00317c124289327ca528fe49190f18146bd1f5529e347b80cc01ee87cfa7cd1fefa276e37640ccbf2
-
SSDEEP
192:uwTEb5nwrGSnQjxn5Q/+nQie1NnfnQOkEntOAnQTbnlnQ9ed9m64bxSeZQl7MBVK:cQ/nEnWxSfSQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 1796 msedge.exe 1796 msedge.exe 2864 identity_helper.exe 2864 identity_helper.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 4928 1796 msedge.exe 82 PID 1796 wrote to memory of 4928 1796 msedge.exe 82 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 516 1796 msedge.exe 83 PID 1796 wrote to memory of 3652 1796 msedge.exe 84 PID 1796 wrote to memory of 3652 1796 msedge.exe 84 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85 PID 1796 wrote to memory of 4768 1796 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3de619f4a46ea730b0806ec35efc0250_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16323342707379375704,2942545033033589417,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD52e1022f2128f8e767feea7b470bdcf05
SHA18b76595a89efc8d64cceb1a26d046c41cefba9d7
SHA2560656cffa0d7e60a41bc36d2ba549894fc0ec1b54740a173ac0db10cef37a4aee
SHA512d5fec1b505b5289a52fb2730841790ba1566b2dff4098901a0e0694b768f19b8cc978938dea2ccfe6a9d9533ceb2c23ef8e9d459bd00ca821b9d5e77d02fa9d1
-
Filesize
6KB
MD550ba57b62bf4e949c805b79bf29f464d
SHA1dc0057a6188e1d5f6ba44ad4bc8bbb983ae4196a
SHA2561f435597409014003a13ae5f99c6ff0dc4bc02ccf8be26a9c9ee95de48ccb979
SHA5124b9f1509e9c1a2416e7e5f76c385f8ee64ec1a7d939db32394d9ce8a5e07a2f9de2927bbbf4e8be5a8617aad409e9463d83c02650dcaefd3a59adb5a0928cf84
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD534a0a9a500067195568510e29639e49c
SHA1152ab58fff96bb6217205f45aa685eede8dd2b65
SHA256eb1a6c2a228de9caf049d0a8d8353bd2f32f51fcfa7d52c2a0e3e78817ffb50f
SHA512ca6d42cb8ffe244af9cbe3f6cf05e53d2fb8210aa2c87c770518bcd9efb9b8060f1909815303af33b1ea4a539b0766ecce625ede2fdfd83aa37182957363acb0