Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
3d856cbf8643d9f13157ba66055c5673_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d856cbf8643d9f13157ba66055c5673_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3d856cbf8643d9f13157ba66055c5673_JaffaCakes118.html
-
Size
76KB
-
MD5
3d856cbf8643d9f13157ba66055c5673
-
SHA1
7674f81f746820384a27c324edac44fa835a159c
-
SHA256
ca4d32784c6dfb821757849ee0a2bba7131fa163880a1183dfe138e2b48ab8ea
-
SHA512
ede3362d5ddb97b90569e87292df1fd7751c49baa7c7d695f03847c3625718fe53b12a5aa84d4f0d8eb225d4903d3e507613510145dceaad1aee278bfc50a21a
-
SSDEEP
1536:3YuzqVXAtsYYtFNW19aRah/GgdIljRl2RG91KSiBlD6k02LZGzjSxob9ibIBmg:3hzqmtsYOFNW19CC/fGjSRg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 8 msedge.exe 8 msedge.exe 3224 msedge.exe 3224 msedge.exe 4636 identity_helper.exe 4636 identity_helper.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 3488 3224 msedge.exe 83 PID 3224 wrote to memory of 3488 3224 msedge.exe 83 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 3640 3224 msedge.exe 85 PID 3224 wrote to memory of 8 3224 msedge.exe 86 PID 3224 wrote to memory of 8 3224 msedge.exe 86 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87 PID 3224 wrote to memory of 2880 3224 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d856cbf8643d9f13157ba66055c5673_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa672746f8,0x7ffa67274708,0x7ffa672747182⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12716254675245126512,2852653816829660528,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
6KB
MD51dfe8068963ff9c3e3bbed27b7466d19
SHA149a6ee11d60436be9bf3fbeca0bdca9965614163
SHA256e968c8219e4061f1f2ed2ddd8952037810c9f86ba038c37eb45dbfc43e48edf3
SHA5129783aeab10be6d422c760183640df77d432193f898d362d9b72f7e411515cbeae996012d709a488e363f16276ccb4c39a06a69adc62fa44a6ae8cf3c6270f986
-
Filesize
6KB
MD5f6b10d4c4aff8e631e1f37aaa2ee8ce1
SHA19f88de29ef829b1e796fe53f87d85fd98789421e
SHA2561b7ed1cce5da7fb522199ee0b27ed4de6ff1d86eba74d7ab400dea941225606f
SHA5123a8041a9a0eb486a2dfa36ffa1f6c2c7d1398b516cebdc44a6de13b32a34161f3e08289d6704acd3b9847ca619ed29b622ea7e61031103347f76be0082faff8c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5232d01e3e6d1f6227b0edf6d93b5a9d1
SHA16d0b9c8edeb74a061bc28874f7b82e926983ab60
SHA25656efea677fa12f44788142c8389f5ca28a674ef191db2e2e175e9d589abe462b
SHA51254fdbd32c935d565ad01a3a96bb7c09622f3d700edfa5498c7eee8a19b560f5817c68187f46cf7361b827ca98fd43e87bb3ba21d95bb2fefe5eef8af072b546b