Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
3cc42a4ccb95484423bdc2e8bb831e03_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cc42a4ccb95484423bdc2e8bb831e03_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3cc42a4ccb95484423bdc2e8bb831e03_JaffaCakes118.html
-
Size
53KB
-
MD5
3cc42a4ccb95484423bdc2e8bb831e03
-
SHA1
8c30e443515430acefd05421325ac51acff0480d
-
SHA256
2dc4a64cc7b79ed9578c925bae6f61b63d2c4e233c114775939c32a587d53ebe
-
SHA512
d43ff032f9522a8886beb3a151ea0f56173b0fd036d6c35819e9bede85376ea8803bfb199ef4dee65acd359f53bae5cb8712e5ab328c465b2f75ebd56fb999b5
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlY963Nj+q5VyvR0w2AzTICbbAoy/t9M/dNwIUEDmDP:CkgUiIakTqGivi+PyUTrunlY963Nj+qz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 1272 msedge.exe 1272 msedge.exe 3828 identity_helper.exe 3828 identity_helper.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1272 wrote to memory of 892 1272 msedge.exe 83 PID 1272 wrote to memory of 892 1272 msedge.exe 83 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 3300 1272 msedge.exe 84 PID 1272 wrote to memory of 4812 1272 msedge.exe 85 PID 1272 wrote to memory of 4812 1272 msedge.exe 85 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86 PID 1272 wrote to memory of 4872 1272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cc42a4ccb95484423bdc2e8bb831e03_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95f8f46f8,0x7ff95f8f4708,0x7ff95f8f47182⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16989776237232095239,7356081060046015082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
403B
MD598b80e0346b0d1e5226e0bd4e153cff4
SHA1d6b9067da14d96ed1bc692b14b16ab53b832c0d6
SHA256f0a292095e39d5bbc2da32420664315dbf11ffd49351d82855f6852065959767
SHA512793e9e606018392bda81debe318a74842ea2dc2733e51fca3e2f39b54f0220f77e44cdc2991587f3849430ac7245330f8a462784e19dcf137076e9a03d7c1a9b
-
Filesize
6KB
MD5b774ae157ef9f4e5859e8ffb99efd1d5
SHA1e0c74ae589c129dc29df48f3e73d87146d80f354
SHA2560ca1fdb8201c5b36f64de419e72120a78095a6c59611fd70a3bf7aef58943324
SHA5121343518c15f1ab192998bf566cd675317241b2b783d68199650928ac15294c9039cfa59e843368a5b91eefdd4a4b9fc947317e7e0d0d6c283b87d00032d62d87
-
Filesize
6KB
MD508b780b499d71f67714b938be4f51b2b
SHA17e4dfbd07a515ef7659e1c0ea74156332438543b
SHA2567a281a197a83e2075ecb30132eb4eaf49a96ad7684c39336cbaea29258436a01
SHA5124c1806ebfdf161a7263e5d3f71589fe1eb181b1d356baa4a02b83fd31282bb78da05881170e4f565f4360dc21f3208e86f9a316c0b8d81982de041598ddff4a1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58471b6526ce1a415d26623fc25c48f59
SHA17381c2711a19b7adde16a45f92a03bb397ce1fb8
SHA256cda0e0015b41c2b568a2759cab236bf3ab8f5ba93bf6bc481042fdc12ee50242
SHA51294db72134f7ae50f7b7f501cb95c9a574bd5720e0e9e1004e475518f84f6c8992659973fdf756d5fd6535cc5b65f1ed9c789f89d76db41a12d21a4fc05cae9f8