Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
3c0854a6678b72f8237e6eadbe6e2000_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c0854a6678b72f8237e6eadbe6e2000_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c0854a6678b72f8237e6eadbe6e2000_JaffaCakes118.html
-
Size
13KB
-
MD5
3c0854a6678b72f8237e6eadbe6e2000
-
SHA1
71c339ab57c95f2acd4bbc16b21155c231a1982b
-
SHA256
c9bddde0b0730007a8dc250287e476a88efb5942dfdac29edd7813204747c7a4
-
SHA512
c3577017f7b7881098291b6a9d84b1e8d1db4a2a782685f868a8eeceb62eda07059c29b0c9bc6f765ca69f2777863d4e26d72b004aae5f46cc233dd913ccbfd7
-
SSDEEP
192:bNPliPyR31Wc+ykVk/5kInwM83OIB/X9677HNyrFZO:bxzW9tVk/5Xnw/9677HNyrFZO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 2564 msedge.exe 2564 msedge.exe 3004 identity_helper.exe 3004 identity_helper.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 4888 2564 msedge.exe 83 PID 2564 wrote to memory of 4888 2564 msedge.exe 83 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 4484 2564 msedge.exe 84 PID 2564 wrote to memory of 60 2564 msedge.exe 85 PID 2564 wrote to memory of 60 2564 msedge.exe 85 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86 PID 2564 wrote to memory of 1888 2564 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c0854a6678b72f8237e6eadbe6e2000_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fdcf46f8,0x7ff9fdcf4708,0x7ff9fdcf47182⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14383103105363845967,11030734553128252697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
6KB
MD57894ab80bf858139e4257b2ae5d39333
SHA189c916f5fb2e756bdcd51ff5080ec986df543128
SHA256e6281025f99eef9103aad02e1774e71914081bd58fef0ec56d2dea651cbd7228
SHA51258ed7a272e7a57d0e798b1e660b2e87838b541662c85b5ecf450007925aa06b8e9729217f4ed4c041e108be77f5bcb7af9c186b3a4d02b35a76552955c53e958
-
Filesize
6KB
MD572b1f5885c65c3944b73a9b34c7363e8
SHA1eaf13b729b66807e5d31aa24b31deda375384b46
SHA25665cc9c343d6fee064920f3808c2b07209d949b4a516901d59f3d346278c7e437
SHA512a7163846e7e5de54a5046411f12b6b5f3ca6bb7316b7b82147fdb990331eacd1dc1be0bcbb5e1e9fd1bb53ab8efa8858b7a6e0ec0adb6a5a40f4aad476880120
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b7ab0641205e3c9f7390280eabcc8861
SHA1d667423a2cf381bb00728d21a05583b4f81fd3e9
SHA2562f84dceedf507569c175089ec2ba00c7481cdd0db42c60882c4399def15904af
SHA51220d464e43e74fddf00ab5a4c0733914a020c013cdff9dc9b8caae3cee8734fe254d9e3b1e29bdc58019adca9f4c2e47d52ceb98a3fe428c177e882ffd3e1dcbb