Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
3ceacd97915d5f3cac09944736303ee9_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3ceacd97915d5f3cac09944736303ee9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ceacd97915d5f3cac09944736303ee9_JaffaCakes118.html
-
Size
15KB
-
MD5
3ceacd97915d5f3cac09944736303ee9
-
SHA1
e5bc22e870021d8120cc769026cff6e0ed481796
-
SHA256
98677097660780f311acb4e7b31830d1d58cda7c16df5c71ca35dd89794a172e
-
SHA512
f26a6504ab5d24a1a2e1e0ef5823bac7b856d30c56ccddfd85caf132495a84c7ab29be28918fb006fa360c4ddb0d0728cf1781ec78cf364fa6347848f9dcfc95
-
SSDEEP
192:Tugp/aEKRX5kh6S7ns7g72w6Gg+zBv1J97We//z4bhdX/6d+/WNF1NF1dtyEK1m9:5DsMSucup8jo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 4940 msedge.exe 4940 msedge.exe 3440 identity_helper.exe 3440 identity_helper.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 4748 3352 msedge.exe 84 PID 3352 wrote to memory of 4748 3352 msedge.exe 84 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 3980 3352 msedge.exe 85 PID 3352 wrote to memory of 4940 3352 msedge.exe 86 PID 3352 wrote to memory of 4940 3352 msedge.exe 86 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87 PID 3352 wrote to memory of 2664 3352 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ceacd97915d5f3cac09944736303ee9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x7c,0x108,0x7ffd77d346f8,0x7ffd77d34708,0x7ffd77d347182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:82⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2718911113543916889,17081530476234744678,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
6KB
MD53885314a4cb46d594d37bffde07b95ab
SHA13d545f1680fbba4179cc45b12f9e377d63b877a4
SHA256dd8724e920b640b55055dfb5d1c923f5351bd20d6d2453657816a5775de47955
SHA51235a3d2578a9abb37e4e87e8d4115c72853ccf7b79378dd0d150209dfc3e210a79c5edce06919282d477ff07680ab6d6df7ee5a77615500d0167e9a26cdb1c2ee
-
Filesize
6KB
MD5a302b154633996f9c8e7c356946d5f9a
SHA1062ce09e88ce7379473e8ac4f64cea418d6de632
SHA256492e40df2fb7ee92ba2489f54621b59556ced44d2443d0fcc68fd18ae9209044
SHA512dbb33aa1f820505e0b8db3b8330b76a277613ba8b68ea1e416bac5895167dd651cb8f5e98fd8f6e3139003c0343a204f9998de9ad79166c363ce9a132e24dd8d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD548b3c5ec33666967d4d549e598832240
SHA1debf0846676e0afaa5e69795fa4ea6f10ae5ae6e
SHA25655204201c89a530cb08269b339eeb5cdbab52192221e4e39e66e56c7b4703c1c
SHA51248f2aff55cf433b2b8be3675f914697f062300c97a3f9a99cc453388ba54c80f049ee9e14fe3cca7ddaebef6e4609a0c35f8c8af4fd03dd3bb3a0a0a5b09e6a4