Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 22:39
Static task
static1
Behavioral task
behavioral1
Sample
3729cc4726da9903e49c126448ba9132_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3729cc4726da9903e49c126448ba9132_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3729cc4726da9903e49c126448ba9132_JaffaCakes118.html
-
Size
51KB
-
MD5
3729cc4726da9903e49c126448ba9132
-
SHA1
d9cd4207a6c636da3484a4d80bfabef61be95f92
-
SHA256
80be7cf47359c0777062362bde8161acbaafb0274cd2ee899bc35cf4f4aa2486
-
SHA512
d2a1de3b929557416354b4b7c9c992ce7a92f39a0d116391d983030297fcda1fb8eb174f09f16b8fa25568dab767917e94bc65bcd495e9a50fb68a0a4c5fea57
-
SSDEEP
1536:/MkoUdO05WIH+UqlZRnh7pqwgwtEoZOd2F:UUdC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 3600 msedge.exe 3600 msedge.exe 1704 identity_helper.exe 1704 identity_helper.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3428 3600 msedge.exe 83 PID 3600 wrote to memory of 3428 3600 msedge.exe 83 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 2632 3600 msedge.exe 84 PID 3600 wrote to memory of 1560 3600 msedge.exe 85 PID 3600 wrote to memory of 1560 3600 msedge.exe 85 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86 PID 3600 wrote to memory of 2820 3600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3729cc4726da9903e49c126448ba9132_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ff87b2a46f8,0x7ff87b2a4708,0x7ff87b2a47182⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,3285894734452282877,16062345920348714340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
777B
MD54871a79f4208e596650eba01feb7de30
SHA166691ef886431b22e171e0543c0d47ab35801579
SHA256e417e8bc148fdafb902a7879c20442d9bf2e42c1d3998ba8ca30d3ea438c7b8c
SHA51297cd9f1a49a868c12ea9418f2b4de1cb9371b2096b60666439eabf691a6b8a807c71006722c01825c7016f799ecd8763c382345fba10405c615254c3a59f5386
-
Filesize
6KB
MD5a7016192c655d40bce7eebcbab6aa503
SHA17b03744b8371bfdff474d4490c95bf3edc67129d
SHA2560841e3918b8747ab9751c442a2248ed1fe5228af82c5a83b2c6fa7717c6bda52
SHA51262dc8ab5e486551674c4e1bbfb82110fc87f4062cbec3db57c284087afa9b09dbfcac46ed8121403001c401360d2620437a787d1a386c3c75fe597b74ce55439
-
Filesize
6KB
MD52e4d726cfe9b5efc4035559888d9a0bb
SHA1f5303c2356ced0a6c4be05dd6083cebb43711ad4
SHA2569abe31f6267bbdda4c13fe19843c1f9c03d63abc3f039fe67daf604b825b6f95
SHA512b11f87aebc904c0a537aa79330c774b467dfedfc25b9f08995ea384fadf7f364307f4c7d85028c961626f667e9b4ac51713d237adcf69754d0fb9f229aa93649
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58fdcfb8017e83292b9c2dc9cc28c4545
SHA11430d56146a6c4477509c85573085131a326f820
SHA256a7927bd9220b349cbcbb8022ebfdbe1d99eec29f7e048a069496fef0ce23d91a
SHA512c4f93a3d436bc1c006c3b65237e92bf022bc606a70a8bfd596ec9edbd3f36dca204467947186da7d73b661b71266f0b26a8ce4ae6e1a4d6bf68c55aa008c08ba