Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
3e2e14787c8cbba2592fcc4a4de57951_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e2e14787c8cbba2592fcc4a4de57951_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e2e14787c8cbba2592fcc4a4de57951_JaffaCakes118.html
-
Size
122KB
-
MD5
3e2e14787c8cbba2592fcc4a4de57951
-
SHA1
e2d262a8c8e638ab81508a35fc4274ee33a924e1
-
SHA256
5d97da550a7dbd1ebcadc9edc8e7074367ae28791850d76599c5192344353fc6
-
SHA512
bb6d372795feb21d8f449443e17524bdfd741e0a1ccd545f87de0abeef5a22bd38c610844145059568f7c040334b3c4be71a99511ef72e956177a84264e642df
-
SSDEEP
768:oxFipqMbTv8S6IlvZWm26eHw+8J8EV/6XJqOi4QwJHsYYGP4/U+61b1Ec:oHKHHV6o7Iz8JbCXMZ4/uTGP4/g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 984 msedge.exe 984 msedge.exe 3660 msedge.exe 3660 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe 4756 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 2896 3660 msedge.exe 83 PID 3660 wrote to memory of 2896 3660 msedge.exe 83 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 960 3660 msedge.exe 84 PID 3660 wrote to memory of 984 3660 msedge.exe 85 PID 3660 wrote to memory of 984 3660 msedge.exe 85 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86 PID 3660 wrote to memory of 1928 3660 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e2e14787c8cbba2592fcc4a4de57951_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ecb846f8,0x7ff9ecb84708,0x7ff9ecb847182⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,5595864690876425812,9872016206651051259,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
6KB
MD5d04a686af412588882395e38e4c94d59
SHA1f984a070bb5e5005104dd976c92fa0df2779539d
SHA256baeeaf65049bdd6b9aa226e20f9a1e711363ff69ece7f36d5b6b24df8accd280
SHA512dac7a1b508e9e3e9d15ccc279b36e5a0a418e855affd0c529114da557b74a72cae9762e9be3465dcb5323164c8a5658be8511108e8b964a7bfbdec64e5a100bf
-
Filesize
6KB
MD53fcc6c04cac7849133eeecb4739d4565
SHA1e4b5219807b56e23f7c1b70135f58681baadbfeb
SHA25672337b1e46373b538300ddc8a59874fab33042de0854c5bcfa3d193085139a94
SHA512229e3b4adb799b685d66a1690f90c7882aff58157d33a040f9c6b32698704d6607b5ac78503e53488b40221c14f5f5a73e5fac413465a94c008991e28a0fa9c3
-
Filesize
11KB
MD5a63aab1a68ac7d547a1d7344ed103251
SHA1b8961c2c64feb5670dda9704f30e4d19a7af3bc0
SHA256fd59f47e076e281c14bc3218f2ddf14f584ba8ef909904c96bd99a558dd23790
SHA512fa85389e04bd7e5d73413ad00746354c3fe1ea710098e57b02aa71fdd256209d2707aa82f2736d51a510f6d5099837206bad91dc3752da26eaed609104cfbd71