Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
3769cce34769273a3cba7e9570a21341_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3769cce34769273a3cba7e9570a21341_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3769cce34769273a3cba7e9570a21341_JaffaCakes118.html
-
Size
120KB
-
MD5
3769cce34769273a3cba7e9570a21341
-
SHA1
8aa1772e513c53917ff660eec2a763b5116aacd1
-
SHA256
8a9e5507a9b0df1abc8d094ab5375a571bead0aa9baeaab79dc17bfd631f83c0
-
SHA512
55c57b768271faaf83d57f7d7288f80ce410c47c902f1f47536883f7b5f88398b1657a5080c91461dff9d7638d9aa17aefd0169591a64fe88408fdb9a5f4f24c
-
SSDEEP
1536:DdQIejyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:myfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 5088 msedge.exe 5088 msedge.exe 4052 identity_helper.exe 4052 identity_helper.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4008 5088 msedge.exe 83 PID 5088 wrote to memory of 4008 5088 msedge.exe 83 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 4584 5088 msedge.exe 85 PID 5088 wrote to memory of 2108 5088 msedge.exe 86 PID 5088 wrote to memory of 2108 5088 msedge.exe 86 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87 PID 5088 wrote to memory of 3188 5088 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3769cce34769273a3cba7e9570a21341_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe485646f8,0x7ffe48564708,0x7ffe485647182⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12425737878426221236,4954086798311353597,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD54b5714571239904ad1b364773b886134
SHA1f61bce5d4b3edd9f6652733e6217f84fc14023ff
SHA25645885eebf01fd3581856474403877c0a6a16189bb7d9476fb93beb31b304bf36
SHA5120d7d11b8419ef06fd26b3c6b219c21e10f7ee2c11cd59a7c886a533cebdb2eae17e3b9210de521f703db78904479978f58c95db2d0d93b53394774ad3e2969b1
-
Filesize
6KB
MD5fe7d4599f2c7b274b7e80560ed0cbe06
SHA16b06e8502d81c668c080807d1d939244804d6aa5
SHA2565bf838b04146f49cea500d259ffd00f3a50ce68bc0c896d048128bff2b377649
SHA5124271f3397a3b71e0856241b621b61f992a8116b004df1efbce4378745d6e9b3b71d4dd6ce804d4e238aefaa6396cf3e855e0fcfc8e0d55e34525f3bc16f24035
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c7381b669ce0a2ad71852f430f309491
SHA11a5218dcdb49f053130d00fc5294505bdf63538b
SHA2566518f17794c371644c6fc71aa84839b5a109e7aff19c24a41876ca16cf42b657
SHA51294366d44daa86b0e3550f02dc9732dd718d4f1b1289dc970ca6c3a5fea2291abc0de653f3990dcf7a9b4717aed36704334393a038666a81809a7b0980326db6a