Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
696c8931a90c31201cb3928f2690b635_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
696c8931a90c31201cb3928f2690b635_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
696c8931a90c31201cb3928f2690b635_JaffaCakes118.html
-
Size
112KB
-
MD5
696c8931a90c31201cb3928f2690b635
-
SHA1
945f10a4a6def7d17556dd0c870bf6813f11a7c2
-
SHA256
87db5c4938599499ecdb6c27b4c76d0dc667546d99cdc86defcc4622a461d81e
-
SHA512
388db7325c0df648616bd17aee3e09c73189222eba0b03f7cce15a79252227d80a949045b84768d48b7d65d1db38ae0a8b9aece6f537ba2f3aa7442ded00aa16
-
SSDEEP
3072:5x2ALzeF729DLCU0P3j91rZb7hCil9BTKMtYy:5u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3968 msedge.exe 3968 msedge.exe 2060 msedge.exe 2060 msedge.exe 4484 identity_helper.exe 4484 identity_helper.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2060 wrote to memory of 2028 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 2028 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 712 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3968 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3968 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe PID 2060 wrote to memory of 3088 2060 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\696c8931a90c31201cb3928f2690b635_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb533746f8,0x7ffb53374708,0x7ffb533747182⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,10704313111121666313,7300378408343105934,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD590dde1500c878c1f10e52527475143da
SHA1b9df6916e4845eb2d60c3b4e9c416ae606f5f4b7
SHA256e30d181dcb8d028b0beadc56db7fdcc27cea7695edd81f2ed44b7cd1229bbd5f
SHA512b18f9c4056d5d1cd0a261cb9fcb058f58ad539f9520748b7c608f5220185ba6bf4867b23a6e8e16bcae37de079586889e445fe4e1d45565d65cecc36c39e4d7a
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b8598291fa902684e873b47907a27370
SHA11bd2a62b0cc8f6ca8c33012fa12a4a6ca89ee459
SHA256ca060ff1878b0cc2ab1045bcda9d3132eaf483cb6e32212f75af620911eee304
SHA512c7f57b4930febdec4e016c13ef2f23a147c4afbd1648bd0e1f56e0e4448261056c857f85c1a20ff668b76d986c96d0523cf85231b4937fe1f07b91b3b6c50d63
-
Filesize
1KB
MD52c942941ad449507a6aeac9a317edf68
SHA1013d34ce449cc7180d5d8dcf599073bc9069964c
SHA256b5e5571f7fd940f28e52c47429767c9ff1b1bbea27f892d5beefb8338b406a7e
SHA512b2a0f02cfb2fb6bce2724814559706b5a888453648404608924eaf90fe3f1baa195cb031feaf0cabd74e5a964441e6eff281d22952d0b47e0529e59e9a35ea3b
-
Filesize
6KB
MD50a0cb936e0e4f2df7b5cca71ab1fe99d
SHA157f5fc71c786b2f786d567335720a64dba8cc8d6
SHA25653f15ed235ac51a31f97a17c0fe4d27ca1ea420bce632d692b97e4be0f7d3840
SHA5122d18cca6a48517df742f35da3cf09c0a76c2511a8b044762413e9d9c2f1e43ae9302730aece746c3b4a44dfe69d4d07b1a7cac5259025f629eace9a24a9fde91
-
Filesize
5KB
MD51f947abaf35c4f353dc2e0c136f2198f
SHA1a6003876eb88a47f5279fe02f73aa68b5207179e
SHA25616a42bd80cff244c8675496a93644534b66c4679b25e9634a6a7e26493a0032c
SHA5120ad09df682ac7350317c98fbaddfcf107c601e7a8cd2f5fc5ed47419c50aae9cec713328099de1ca943164f6d7bf4b450090056a784e56f9a2af4f57e3f8ed42
-
Filesize
6KB
MD59db1b1c488025e358bf18bd003f42702
SHA1e34a1e7ad537cc98914f94ffda489398dc346cbd
SHA256289a2725a885b0203969dfcfe042fe3ea6602e204128224a2c6adc9a62162dcc
SHA5127475829cc6f26611e8d273368c57a6319bcb1becab2a3ec96092ab705127fa4190aea700a13f88f105a2209f98fbce884cb56b48fa6178d83ca5c5ae3bafb87a
-
Filesize
6KB
MD52fd938f9eedd5f352e8857e011702be3
SHA1ad5c4ab0a1029decd8ac47f658984ac7b05888ca
SHA2567119fd520554f067437af73eabfa44fafed584c3953a1edbb635f3383416fa69
SHA5126646d60a6dbcdf20b3411e325334053948dd262f8cd1027914b69ac7b74bf697472a831f365fb8c8cdfe251f61fc8c1458e059adddfdb8670644f31c40f0fa26
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e