Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
3b2d8922f02edc329ae630cb2b19170f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b2d8922f02edc329ae630cb2b19170f_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
3b2d8922f02edc329ae630cb2b19170f_JaffaCakes118.html
-
Size
16KB
-
MD5
3b2d8922f02edc329ae630cb2b19170f
-
SHA1
e8da55e5eeb16f5eff2106e6a0666f8c209d58e7
-
SHA256
c1fc51a1fd37eb4d926cebbdb11a7c86dad68055a0a006de351d65681874b3af
-
SHA512
ed1b9a8c24713832dc2435d79a7744c42c8b36711a3a97bb7290a7340653612f87e92161ac81e24bfea1bd26e8d9ed900bbd1b23fe0c2d7a89671416ff17ab6c
-
SSDEEP
384:gOcebobuH+Y2IYhaWviFsCLn8moC063W7pRa2xoMkkCj2oJ2:1ceEbiBoiGN6D2RaPj2R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 3160 msedge.exe 3160 msedge.exe 3068 identity_helper.exe 3068 identity_helper.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 3732 3160 msedge.exe 83 PID 3160 wrote to memory of 3732 3160 msedge.exe 83 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 4528 3160 msedge.exe 84 PID 3160 wrote to memory of 3404 3160 msedge.exe 85 PID 3160 wrote to memory of 3404 3160 msedge.exe 85 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86 PID 3160 wrote to memory of 4848 3160 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3b2d8922f02edc329ae630cb2b19170f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb54f46f8,0x7ffdb54f4708,0x7ffdb54f47182⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12616047016029862009,4512128508445530258,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5af87c0a8ac7d38e50adead5de8987ea0
SHA120d6c8db7dfc623b0af614485acec52180435683
SHA256aadfc6dcbcaea902a15727903fe4ba92f3488b196f4f71e324f8bae998701e2b
SHA51288facea21a6a4da3712130a4bf4e579ff713132cecbccc63ad74caf7250347ecc9f70fbe7a2f944a7079a578ebac05736f48f765e21954f724c97d26f2db9911
-
Filesize
1KB
MD5e7640aa476debd41ba97fb31b059b4fe
SHA16fe20a0428027dea7dac02b7869937b28eb8afa9
SHA2561dd091b448e98fff4dd1eaa44e778fac7444fdd68db61ecfac15203f7b1c0908
SHA512088aadf5e712b8b6997a235ce8f8206f5e301b55156fa5af40a06a5af22dcd44fdbde4776839e517c1b4c21c67bb829283dc7d6b4021af7600321c26c3a2c720
-
Filesize
6KB
MD5a42ea808caef99c33819079249a6c5d7
SHA15ee4caec02c448372f4f9fbcb20b96bb15a6c4c0
SHA2565dfa239616a11302d43ae2a448a315db27cc241f0d31a91d4e54b19c93e43f76
SHA512250ab91e7a3c255cd0b604f371bc9c4eed6487518cd9ae26b3c21c38017120fe414b6022afd4fef6b791c01df2e5f1dafce5bf4258ebf9334311d033e15e3463
-
Filesize
6KB
MD59edfa863c65bfc9ee3e09ccee7403c41
SHA13de1f33602429682d0e40cf38c650547340a0847
SHA2569b4289164fd856760db96e854ef4814e0dfb42ef788f43f46edab7cada166fbe
SHA5129d814547ec8c43dd1a8a65a9cfd864237894b02cb957f4e1ad5b1640a5f990d04184200284f60165cb6cfd04b402d91eed2b2b2f33e02b8c80ca844a2837cab5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5555c90d727a1aaac435d303d55912940
SHA1a675e4d570259869744698a7240706134587afa2
SHA2560fd304a0396e6d48eb3d5889a2fb667eb5122769d61102e90ab5178c15e616d2
SHA51222e1cce8457524ee205b229dbf1e6ad6b21dfd0c925feb7f56e67d52f649e4c997217db536ac79ba1122d42e42e90ac38c1424ac184a60a1974b925881d748dd