Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
3ce3a00fbe5c0e063c9297f87f0b6b5f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ce3a00fbe5c0e063c9297f87f0b6b5f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ce3a00fbe5c0e063c9297f87f0b6b5f_JaffaCakes118.html
-
Size
120KB
-
MD5
3ce3a00fbe5c0e063c9297f87f0b6b5f
-
SHA1
f660be57b5d5462fc9828693e8a713ec1b146b96
-
SHA256
60e4c428f7408e071f000c585f1f6e96f8c059fe8c641df52b4d2253db2fc44c
-
SHA512
a394f5b55c93100a67de91420fb3daa116ddd20fc319ea64636f26f57fb7e1b5cefc26747a5a1e4a2d8d23b30844c491c2f015dc21877221679d95cf66aa3ff5
-
SSDEEP
1536:a6kLcIDFI/FAjkCjOY6+Gtyx/k3PE7Ro5:yLcAFI/2jw+G6/qPws
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3888 msedge.exe 3888 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 4748 3888 msedge.exe 83 PID 3888 wrote to memory of 4748 3888 msedge.exe 83 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 4420 3888 msedge.exe 84 PID 3888 wrote to memory of 3472 3888 msedge.exe 85 PID 3888 wrote to memory of 3472 3888 msedge.exe 85 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86 PID 3888 wrote to memory of 4776 3888 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ce3a00fbe5c0e063c9297f87f0b6b5f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa19f046f8,0x7ffa19f04708,0x7ffa19f047182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,920413446321932044,5508181702378997622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
6KB
MD50b4ea00ac5c866b5a3ac0539cfba3c56
SHA1b5c6fa6723f4407b6a54d86561360c62428c0b96
SHA25650ec115d4e076565969f9595a2fee28ba7428af35e71d679632f7d7efad9f793
SHA5123ce82df467936fb887ff104e53cafa6c9acb6b9243084b75ed4786799f742288fa9ffd3de6a421ac516a3d38da11bb6736eefaebed42abe73774fdd4faf6345b
-
Filesize
6KB
MD524695443064b24919ac820e7bae069a7
SHA137b6f49631aa96357dc8e31b66c1ada9ba4a3585
SHA256b786623546199c2044215f497383deed58e8e3a61f44717020ae54b55ef2a5a4
SHA512cba045c0f999b8bdcd7c45d6361383e97aaa7b99e57a770b0be636e73692b1c3a6f05297437b2e30dd52f5959895545eb851d0230c62a3f803ecc22af6064065
-
Filesize
11KB
MD5d515d12d0837714f7610aedb0d19f18d
SHA105fb388fcacac3455974f517a69794c873bff7bf
SHA256125048b96ad348c08e14c4ac82b609dae160e74f0f02c9330c1e0f07ffd09676
SHA512ebc56d7b0fb81883890ccb68a0f1ddd67c4aa6ed38edcd31e62ba0cbf8c58b6de8cd26b7769340209399b6c9b186db80d986852da4761c2ee67b6b8baa2e968b