Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
3c292dec312d7de9e6e36c00168ea6c3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c292dec312d7de9e6e36c00168ea6c3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3c292dec312d7de9e6e36c00168ea6c3_JaffaCakes118.html
-
Size
18KB
-
MD5
3c292dec312d7de9e6e36c00168ea6c3
-
SHA1
a2af9c22632c517414d9ddaaafa5e5236caa9a7d
-
SHA256
e02cdd8e553cf450c9998d3b5c41b9b85d0acf976b9970971d4063b75ac015e9
-
SHA512
44dfdf53e7b0bd3182940eebe56601e17370705c42cbefd6e7b7f1153cd2c9dcc73c43196d5184bdaf0215f293421266dc153bdc9bfd3692de199d6d4a17c0e2
-
SSDEEP
192:+fdbUkcjG0ogndANzUrMi+mVK8TzGpYfVK8TNuqiyYkwYjAf4R0sV0l4lK8XdgKu:+QRQzAMVmMefMsrYkmqi4cMdR3JmRD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 1188 msedge.exe 1188 msedge.exe 764 identity_helper.exe 764 identity_helper.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe 1712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 4576 1188 msedge.exe 85 PID 1188 wrote to memory of 4576 1188 msedge.exe 85 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 3400 1188 msedge.exe 86 PID 1188 wrote to memory of 5076 1188 msedge.exe 87 PID 1188 wrote to memory of 5076 1188 msedge.exe 87 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88 PID 1188 wrote to memory of 552 1188 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c292dec312d7de9e6e36c00168ea6c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd56ce46f8,0x7ffd56ce4708,0x7ffd56ce47182⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4699553119556241111,7061630331393320805,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD5c563f018499dbc9ec90fb404f69b9fdb
SHA196a9423f46caac57a6921f61437e9ba91e7420c6
SHA256b57aa41d3de79f0da020dffdfe33c365907c8c2f4d6a8975ee425b46b2c4c87c
SHA51264ea0872a089291ac693bf0ac354b98edd7249366d8fb85ae5fbe814eb3ed5e948989240c7a263d418a17401f57b83548a302d77e77d7ea702e7d534fec5b48e
-
Filesize
6KB
MD58829c8183441db2d2f1f32f8964ce5f4
SHA1c15ba86c3601b73b75be6615c2ea96d7ab13da24
SHA256435f64d0141c9c531f6f05e38db7a12012b310bd24947ab037cc1d5cc6b68d69
SHA512548c5fa9f8ddc0d59dedb14ebb33a6722d48d8301e752425fe7e9cb2572b4622f79f03e4a154f6498d69b9b6c309d7fefab17079c2ccbbec16629e595ea1e490
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bdfbb651ba9beb462e9cc97b40828bc4
SHA1268f9ee2dea03a1318bb6241b4387b86958d1b12
SHA2566a7ab84c307ab0bb1a30a2eefddc100ec67932e7b2377c864f2c6c01e1740586
SHA512fe018651f569b73cc0aee60a2c6f582e4c4bca393317774ec03157515d4a4b722f8e66c19615c050108c7aba07447b73e73c137ea0610c67b56d169192761438