Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 06:23
Static task
static1
Behavioral task
behavioral1
Sample
3c4aa65c5196afd0e0d3e1645e7d429e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c4aa65c5196afd0e0d3e1645e7d429e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c4aa65c5196afd0e0d3e1645e7d429e_JaffaCakes118.html
-
Size
16KB
-
MD5
3c4aa65c5196afd0e0d3e1645e7d429e
-
SHA1
d5804041d1ba6f13de29d6e2eff0f2f2a3bc9e2c
-
SHA256
564f28c4899808e25ae7ff84ea8120be6045d2750b193a7eb8cacebf3865ac99
-
SHA512
4259f056acebe80b3444a00ec36e8475761fc096ed4624f5507b7321d130556e82ed78100e8cea24426ff6aa42cf61e441908b24e295881f997694fd86f3fb4b
-
SSDEEP
384:8HC9c54MSkDTy9EerDoGB18cj7U97KNrjN4j8I+J2:Jc5Z//yORKoeQb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 372 msedge.exe 372 msedge.exe 3144 msedge.exe 3144 msedge.exe 1456 identity_helper.exe 1456 identity_helper.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 1028 3144 msedge.exe 83 PID 3144 wrote to memory of 1028 3144 msedge.exe 83 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 2276 3144 msedge.exe 84 PID 3144 wrote to memory of 372 3144 msedge.exe 85 PID 3144 wrote to memory of 372 3144 msedge.exe 85 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86 PID 3144 wrote to memory of 1680 3144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c4aa65c5196afd0e0d3e1645e7d429e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab1f046f8,0x7ffab1f04708,0x7ffab1f047182⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,17516925067923603482,1851320493617839639,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD504b6290e97b9ebe7832ddb9ff8afef5a
SHA1955181a46c77a5270624ba3bc24b9870af9377ea
SHA2563ae8216eae5f092f7afa76a45a672a714f569da4aff99c3026694edaaf71abe5
SHA51202f4edd786d74e747384508a7ce07f8ed18d89dfa360f846f1673f8246b4056ca8dde4165656397a5c69468d85bed1cf5db1e4fb87bfbab6a80099340274acfa
-
Filesize
1KB
MD5846585be04c5743c1b4691bec3e4b6a7
SHA12eef087355b48d50d104b4530c41d6e048df8619
SHA256d14b108cef239c6d254d15566a76f29a079a7d9a1ebafb79c624e798a2454d8e
SHA512791053b2e635c77083dd3a119d71483483ace7b56674799dea30eb1aefbef6e94f0584aa30e8f621246dec3b6aa4f021d95482597e304d0fc43c4c500f4d1d54
-
Filesize
6KB
MD50a042dbf473867fbc6cab2a30aebddc9
SHA171b15fa3f9c3bc7574312e56a4e86cfdd88a8ba0
SHA2567bc2b4facd50696dfb9cc9a31616b6d693f6692509081cce941dde378bb40078
SHA5127228199a10c55c9b251129a0707a9f2ab4632111a3737c1b554a06aa1592e7e75bcf7416e5a532c5c5f106debc1fb9217f0b4507d6afdf44610764757e34a420
-
Filesize
7KB
MD5e2c17a1fddfd177d142ab04087032e0f
SHA165dada262862380208a6504e9910c74a4af1c3be
SHA25654da46483d3f133128f905ce495d999ae684e6caf955d81801e3f60d5a296f06
SHA51296fb8825bbeba24ac7d5cc58db41fe36d12d724e3615a8663df1bc4f9616a6e4408424868fcd04b6dde23d161d80a2a71ed597bbb1d22278befbbbc91be1e3ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD573ad2b9b362acec09c519bb822804a0e
SHA19b26c179b209fde2bdad2285284014d18eeb9d1d
SHA2564de4958ed79852a11a196b3d73523a5f47d0c3f14143c4bb01bd9c5919f50182
SHA512fbb8d98766a82a731c37f79dcd95210d1ae3d57a4bb4329cfbe9c21f62d1c92d23203a1a97b4bcbd5c0555d7d499213abce193aeea694029d7b508a7b3168e72