Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 06:49
Static task
static1
Behavioral task
behavioral1
Sample
3c5d75de3638e0d0784988b049343a79_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c5d75de3638e0d0784988b049343a79_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c5d75de3638e0d0784988b049343a79_JaffaCakes118.html
-
Size
26KB
-
MD5
3c5d75de3638e0d0784988b049343a79
-
SHA1
562378aff027bcd1c9a0e05e3e5205dfba30831e
-
SHA256
c5fa7b40881e32b4b32017d2f40cbddb715959b3e4f42b74575a9ae6b64f1067
-
SHA512
39c68c62b92996a6ea042beba4a16855dc533c6756b50725f45bfe53f4d2066e4413f1295203cf531009f1627aa6fd43eb605c092ddf0ef806a7d63ac46af407
-
SSDEEP
384:4+QfPFd9QZBC7mOdMMKBKfpC5IgSnbmFe7Ac0B6H2kJvAgo0iJAWPd:Zcd9QZBC7mOdMMXpC5I9nC4BIP0iJ5Pd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe 5020 msedge.exe 5020 msedge.exe 1396 identity_helper.exe 1396 identity_helper.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 8 5020 msedge.exe 83 PID 5020 wrote to memory of 8 5020 msedge.exe 83 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 2980 5020 msedge.exe 85 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 3500 5020 msedge.exe 86 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87 PID 5020 wrote to memory of 4424 5020 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c5d75de3638e0d0784988b049343a79_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e45146f8,0x7ff9e4514708,0x7ff9e45147182⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16573189656796263683,5586990441814841210,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5b1d283bbea9e746e309171bd3814a805
SHA17bf6ea6f2fe379fe21f62a36b3996e11f6ef3b63
SHA25660012013a541e1785aee37758ba4f0863896764a80c2432904cde37448a448e8
SHA512e1fa839c8983915725f8b4a61941b7482ae4e3b2777396ceaa79441edd9bee15fd558cd899ea6d4368b76a9b1b69a005b9ec7546ddb378118ff3d46e17035651
-
Filesize
1KB
MD5ea1c56516c82d47779c142635df161d7
SHA105108fba8aaaa1f0711846eb1c10e627abd2376a
SHA256cfb40c8386c685da49660fdcc26edd98d1d6c885af4528365cd4365e05ce6249
SHA512c778fae8cdeb779ec41821cb73ec1e717f93fe8815d56133a433114e1dd0f6e76d7bd5d8c86a9c7c431360556c40b3d3790eb1c45235e508ef00ee0582a1894e
-
Filesize
6KB
MD57e0433957beade6d8d5522b540e35e8b
SHA17cba06fcc1a5363d13eb889e4cd7f0ffca765b21
SHA2569658c992cd028550b63a192855732963b6f742eab069291f355eb7969405d619
SHA512583698bac15857504ea1b9ac621de7dba9e9a84a813db9926432ec3cf02ab32258c0750badd8cfd4d53b84b9df99ceadc53bca920c312eb5ac6a049e2c46fe35
-
Filesize
6KB
MD5eb4e14b83df531fb64d4b224b55d9168
SHA1b841f5c851b7078cf299001ea871f9e5b01dd44e
SHA256724a86ecaa0e2048ef82ee28a3899ba0e4c0196255acc7c7288c2fab2ceb0c5d
SHA51248555b4e0bee2359a81b873359dfb53761d45c13a95a359e587de0b211f016a00c07aab1fa5af9401afffceb10a99024b6edf32a1259cedc191b6ba602e53400
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58ed7945f92cf2730eda5e7cf369065dd
SHA1980d20a062ab6ca8af3356aa96a97477e147ce60
SHA256946ea81c32be84a0e7c10f9366410f3fe8b3cc4498240ad78b5de1c9991805a9
SHA51290471f0043e82656740f95c42e4352da4d7a365068d946f6ae04b17addbe3429516105789bfe29f51f6a002068db74326dddf62700c394c4c190e2d263b1ce02