Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
3018ceead6c10bce1190cd54a00699b7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3018ceead6c10bce1190cd54a00699b7_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
3018ceead6c10bce1190cd54a00699b7_JaffaCakes118.html
-
Size
20KB
-
MD5
3018ceead6c10bce1190cd54a00699b7
-
SHA1
50f2aad309c92c2f16add38d7a43667ebf66f149
-
SHA256
37e0b179234b68fc9c8d8454ba06d6cf39e4b10e739844da402c829a588d72ec
-
SHA512
46afcaaebe4e6c27295f59a895eb99e60e62b4ad72ae7c465d083b3c2c2e660c9ac0e71dcc9e97d1da74b099a0979c92184f721dd4cdca357d393d31abb626d5
-
SSDEEP
384:DGVK6A6jvorPDcFaz7iEUoLzw6dRLWYpY7qt:6VBnqD7iEUwwGEYW7qt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 4940 msedge.exe 4940 msedge.exe 5012 identity_helper.exe 5012 identity_helper.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe 724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3296 4940 msedge.exe 82 PID 4940 wrote to memory of 3296 4940 msedge.exe 82 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1700 4940 msedge.exe 84 PID 4940 wrote to memory of 1716 4940 msedge.exe 85 PID 4940 wrote to memory of 1716 4940 msedge.exe 85 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86 PID 4940 wrote to memory of 744 4940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3018ceead6c10bce1190cd54a00699b7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe931546f8,0x7ffe93154708,0x7ffe931547182⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6158343662805044070,882974405041481563,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
Filesize
928B
MD56a0610cab1891bcf6c7995f1a10c3e82
SHA166b4f879e008a745aa585a2d1f07eecbacbdd82e
SHA256b2afc0250f3b0ca9620c90ed99a91293eaeed2e1a320122437a1939af8befa86
SHA51226f20bf905002571c77615e8755243237ecacdd780befa2e4fd77646cda7d5e1ffbdbccdc024a33e1c599fd6f40e9cf9263f63acdf6f1f719a4b0ff3948aba5a
-
Filesize
6KB
MD5b32601429d2e9f3a973d5d1a8efb31da
SHA1f2fe7c895cf3924870dc52c2f9a6c9bf4db00e19
SHA25653c9089932830574148ae1803b47cc263d43864a3f5c5e70ac8c73fcfd9cc8fe
SHA5120e0c48681b1e3d2c6d7379ca61f0f188c1b9ed7c109b107ea47962ddffe0a9f011424d067f91ec7e9b5db49450f04b9327c61bed4f24febd8090c859cad27d45
-
Filesize
6KB
MD5d3362f6684f79883ca178254d5cfe3ef
SHA13bb328fc612d7a48dcf1294f29cd8bed258ad405
SHA25643356100d86766efacdb65d06209dbbde0615eeb99262f0f8ebc698d38e8b54c
SHA512f2d11c16cd0fdac7fdb9c97113539aef26cb5be4b189e25155b61f303afd99a8af9ef4ca54dfd2a732ff74555ded450dc7d8cf7a45d08d0182905e6148cf4542
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD536d23fe4cbd2be234ff7e500bc507c3c
SHA1d14ac65cf612501a839df6a270116e3640af2840
SHA2565456e60199e1d917ac632905fff11a3bed557231367b67727a4948a3a29f9498
SHA5128bdc9c819356df1c8beb1e2fc0fe879d52972e1d52ac8a1c494d99dc5335d77c928eeb18306ccea85a17aa0baa6150190c40894475bc3b034b3841264a6df68c