Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
3edcde70d4ba7672a17befcadc77212e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3edcde70d4ba7672a17befcadc77212e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3edcde70d4ba7672a17befcadc77212e_JaffaCakes118.html
-
Size
70KB
-
MD5
3edcde70d4ba7672a17befcadc77212e
-
SHA1
a02e288c3407d72edb1ea18c0adcce12c74c8d30
-
SHA256
58c9ab51620f9f2e6d43fd192a5378cca3800124c16fdc2bfc874889be67dfc6
-
SHA512
363f73ca52f6d3747e2fdd7812d1e4ac7a6b06566f4ad8410b666f968c398e451baf3235314067513815a1e677c570bb66f0b5eeb5d898c5469a0985724ea507
-
SSDEEP
768:Sy0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/VK:SydmIk/3tnwO87EOKPucc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4240 msedge.exe 4240 msedge.exe 2760 identity_helper.exe 2760 identity_helper.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2228 4240 msedge.exe 83 PID 4240 wrote to memory of 2228 4240 msedge.exe 83 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4832 4240 msedge.exe 84 PID 4240 wrote to memory of 4528 4240 msedge.exe 85 PID 4240 wrote to memory of 4528 4240 msedge.exe 85 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86 PID 4240 wrote to memory of 1216 4240 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3edcde70d4ba7672a17befcadc77212e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc362046f8,0x7ffc36204708,0x7ffc362047182⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2388 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,2087494271920367287,18264494417564330831,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
6KB
MD516a792fdc6e1a87093b0aa940357943f
SHA16f0b6cdb26ec40c89cdba5b5b1282cf3d153460c
SHA256a2945bb0151609eac602a432a1599dc1595b007cce7419e4c7ec171a42c93a05
SHA512813f7402e4e54f38318ef07c40749fc212d02a2b10e894a77f666d0971088a346b26abc4704e1f9d9adcb5637f78290f6cf1dc5061cf113c5d8d317f478bcfd5
-
Filesize
6KB
MD5e2226ff69f7c2a303c257b08b02514e6
SHA18b77f7e72b181a981ad140928d85532ef5d434be
SHA256ace1755148b0799dedf3143a940018d1923ff4f752206d3956ed099680ea4134
SHA512ec96cdc9da384fd8e36aeac3f2622b5286bd6c349c319d8724c3f97b8b6f6ac28c4ab4d0b1df64ba344a0654d341e94b4d8b8ff00fc52dc8965ce827bdedf59b
-
Filesize
6KB
MD58b9b3cfbaade03b358c5b367aefa0d88
SHA14bc62aa0ce7d6371537844f5a2ace7c831371aad
SHA256ed4fb1b2fa2bdbc0f7c59b57d225b4baba5bf587ae8417040520fb2ffd6a04cc
SHA5125ed5a839cb4b501615f0208fec68ff0010d1bc798e9ecc391d78a5d9668644005801bfc8ebc6d1ae94adb572a3d07e6493f036b3fa2d9853fd576e98e222842a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50851e9b4531d4e599afdad73aec8dd45
SHA18e9285ba6d35039ca146b85c6eb47628824d417d
SHA25639fcf0fb9a62b858037a5915cc5d436497ee06e9fd690f3e66c89871d42da3b6
SHA512d1cf37fbd3c3226accd014af359e0254bba44bf5e1923ccd06fac16bb0955917f46ee0fb0d1b48e18958eca6ae245236cd4550ff2a4608121c8916546aa4d963