Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 13:35
Static task
static1
Behavioral task
behavioral1
Sample
3d95599bd06738cd6db5ea36e00ad547_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d95599bd06738cd6db5ea36e00ad547_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3d95599bd06738cd6db5ea36e00ad547_JaffaCakes118.html
-
Size
125KB
-
MD5
3d95599bd06738cd6db5ea36e00ad547
-
SHA1
014aa211eb6c76966f4e0063ef3815c9482fb664
-
SHA256
35d9429f0d8f99b15d75c56776d4098b6bd7094575ad658f379d8fdc133b42d4
-
SHA512
40fdda1927a26b6debc5c017ef26d1a9db51c458c90774129443bea1e3efe8ef916aac35732b6cc1849e0c7843e0170cb99450152e8f4707f55d81ce804fcd8a
-
SSDEEP
1536:35SyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:JSyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 824 msedge.exe 824 msedge.exe 4352 msedge.exe 4352 msedge.exe 4348 identity_helper.exe 4348 identity_helper.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 212 4352 msedge.exe 83 PID 4352 wrote to memory of 212 4352 msedge.exe 83 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 3680 4352 msedge.exe 85 PID 4352 wrote to memory of 824 4352 msedge.exe 86 PID 4352 wrote to memory of 824 4352 msedge.exe 86 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87 PID 4352 wrote to memory of 2304 4352 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d95599bd06738cd6db5ea36e00ad547_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed81d46f8,0x7ffed81d4708,0x7ffed81d47182⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14874643756645473250,1910675984709057010,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
181B
MD58bec83679581165889d53e6f0597b1d2
SHA18380801c2caf693b6d23faea7dea17ca2dfb5d34
SHA256bb503f43eb7f04067d1d664973f5845fe2bfdb7fb2010eaba0ad67424e9f53d4
SHA512551f907d8df83c419b5c6959094f9bad0334a3ffdfb134fa764bdced340cda9c89f99e7e5a38391c30885ac98337ac0d2d365040d2c11b6eb53eb5835814029c
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5e80cda0b1a3c864119581df1d74b2165
SHA165defb525c5e975a760933c35d18b1b4243edc49
SHA2564f29cdf633f551a84140b3d20b606410bdb188f3dc1b8467ea8a7ec28a18c0d1
SHA512932f2c56ea3bf9045537bc509edf44f60a45eb5c3cb3e0fa50f03e531ae0d33589b07099ac3ab15ecc895b936fe7882c83d184a0408295ae7f68c823d363a89e
-
Filesize
6KB
MD5b4e4c1b6fd473c34a625d2c4a24e2581
SHA16d6244c3e78443e4b8d6b89c7766f9b7e0e2563a
SHA256ad79f59dbc89f4180a2fdcc3b4b5b4b5a6703dacffd3d56626ed3a608fc55578
SHA512fb49cc40a0b0213e6bf176061bc592d7cf2abce5b5ff1ad1806f6e131d0452aeeb2983ddb58ae16e78228d59ffcb3708747e8d565b2df487935e6e894e9b5de5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e81a3ac05f9529283afcc5ce7867e786
SHA16af6e40559f52e6f4bae5e6cb49381d8f42df75a
SHA256b1116be0268309bac3d0d4af51e43f2be2b39a4a4b374ad15571cb1b51741494
SHA512b1df7fabd0161f0dc96f9c55bb07a5008f8788a59cb3d2f779e7121e5764b87252976465ba61ab11f5767861a65a7e6e4176a36507b87df4b5c4e02100d756e1