Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
3e20d26c9865e3c77efeeb6f8dfe683c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e20d26c9865e3c77efeeb6f8dfe683c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e20d26c9865e3c77efeeb6f8dfe683c_JaffaCakes118.html
-
Size
19KB
-
MD5
3e20d26c9865e3c77efeeb6f8dfe683c
-
SHA1
903d988ca0b32509b5aeeab19b1a7dc43c03bf83
-
SHA256
8fbd08004b45db0d4fab0a3dda4e3113993eee7b7d1f4909b684d16885dceead
-
SHA512
159755b5803e29e37ba7fc204468be72ba2e426fc00cba1140d6215cd2fd036fed1cbb7dedc2804b9cdca90ace673f70aa7d5dc65048e53d5d9dcbdd333f829c
-
SSDEEP
384:xoP/TcIEhEr2vOsBiBxBO+n0iOzvWsiC3R3MUJ2:sLcLhEr2v/AO+0v5VM1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 3940 msedge.exe 3940 msedge.exe 624 identity_helper.exe 624 identity_helper.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 996 3940 msedge.exe 83 PID 3940 wrote to memory of 996 3940 msedge.exe 83 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4068 3940 msedge.exe 85 PID 3940 wrote to memory of 4008 3940 msedge.exe 86 PID 3940 wrote to memory of 4008 3940 msedge.exe 86 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87 PID 3940 wrote to memory of 3048 3940 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e20d26c9865e3c77efeeb6f8dfe683c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedab946f8,0x7ffedab94708,0x7ffedab947182⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17580322997631172071,16907496152552622834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD59c180dc06c335eee72c422a95be20ae2
SHA104d023f7257655f27f3cb4c0935cea0e083d8bfd
SHA256d948fb3db7454c7fd0ae71db03d37d6553f2d420151fa5dedfaae2a3ee76a80a
SHA5125d9fdcab6e5a722e9be4079c2f2cd718c434dadeb3cd527dcb66a9dacdc674dac904c6310ac69c8b44c24d1b1d8ec9d01b6d2d0145e2476b71d222c8fd3c6fce
-
Filesize
1KB
MD518d4b3351916670e856b04698124035b
SHA1b69befefb472cf3d1d63dd05a08b496c399ef0d1
SHA256cd46a65639e544b1fb7b12bb895233d58d3dab329e3b55eff5e9017a79c41c5c
SHA51257182d586b78d94dd7d8496ce055f0adad279fa9b4767633e3e6bfb480230690c0d904d2d74a2cd1f496caa6e6e16472b065f7bdceca24d6afd8d7c36a2bcdd5
-
Filesize
7KB
MD59bca337babcbde806098c9170a59f196
SHA1f8c1c76da9589146caac64decc833bc305dada91
SHA256faafa07f95c4a6c5f91694a9b65006a2937e79d70ea209264d92dd0c301f70df
SHA512b58e992e4c571bc17d2dd4d5d69c71a732e4a57a351633c8073e7c20e44b60b6b8f446093f93dd2ecb82ebdf8eeb066c4f655d2f00c737a3aad2691e0766d602
-
Filesize
6KB
MD5e737c11c388610070a0512789322fe08
SHA116b6a8b11b959a3a8ccd72c0975ac23b55051a03
SHA25685d9051dcfb13613771db1ae488269b2a9202f5637acbca28e97a7f8c9092449
SHA5123d5f7d82348b0d6b1ebe134dd591f6f2023e4119ae33b1d6b3fa60584ba6c7f4ac71e910a0dc04155a4fe871a0fb88451212d5eeba960b47946e8fe2bc9e6386
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD521772505ddafa891d842f80a188fb62e
SHA14eb2a9d4a2d9c7f6dbfdc688ef5491975232a569
SHA25610c662f1fe5d1fde5c0b5a721f4a6d51b4fce552b99f1b1390494039e9c1207d
SHA512f103f814b024823b05125c3a75ef1420c57435b2c08f6002a10541b90c2814cb95ad6b19cce9678fa544970510b1c1f33bf2d00934b3785ef36e5912299989a6