Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
3851024ff170fb76f27e03778256bb06_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3851024ff170fb76f27e03778256bb06_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3851024ff170fb76f27e03778256bb06_JaffaCakes118.html
-
Size
32KB
-
MD5
3851024ff170fb76f27e03778256bb06
-
SHA1
21d14268cb5b640ff1cd13ad9c34f7fe9a6f141d
-
SHA256
b5d48184a020732743a247a2ba7d08c75ee6ba9b580a9e85105ef99a352942e3
-
SHA512
20dd1a45553730204ccc50f57533942460423573c941a50ad5b983a279ac73be94794ed6b219401cfa08ec370eb8d047c3801c8fcf818ceb56a375561206876a
-
SSDEEP
192:uWLNb5niNnQjxn5Q/lnQieANnQnQOkEntX7nQTbnxnQ2MC9ANYLWPY6NJoky9t/p:pQ/77x6P9NQt3jwOV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 3256 msedge.exe 3256 msedge.exe 3524 identity_helper.exe 3524 identity_helper.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3256 wrote to memory of 2028 3256 msedge.exe 84 PID 3256 wrote to memory of 2028 3256 msedge.exe 84 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 2704 3256 msedge.exe 85 PID 3256 wrote to memory of 4960 3256 msedge.exe 86 PID 3256 wrote to memory of 4960 3256 msedge.exe 86 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87 PID 3256 wrote to memory of 3804 3256 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3851024ff170fb76f27e03778256bb06_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd875a46f8,0x7ffd875a4708,0x7ffd875a47182⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1884 /prefetch:82⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12579054738686208991,11899056569447033911,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD528ddfd0cfb35334ecb9eab3e91fc347f
SHA18e490a6210b22d10775f36356c93eb3d68f19174
SHA2563da82d7e637866bd8e774805332c4ae1d2b922c28f594d1437c94d6fcac7933f
SHA5124f3c93a953c25c2e03a5ad325d725ee8dfe67e345d955997d52e036c1fe3d328110f32576261b39e8dce3570e985cdf34bed677778499e1fa374f6c9bf74b405
-
Filesize
6KB
MD5ca2879f4a1e7ed2ab8397a58dcc2e0b6
SHA1de431b39020cfa79e0a15d7c2e6375c9af11e23c
SHA256493e3ef0814298ca2435ad5a2675b58a6918645103e6a15dc75ae1b3bad990e9
SHA5127ae92a2e10d2cebe8bfdc50c2fdd5820d252c3fd38f08fda9ff20ccbd823aeac2c5aca45eeae51d6857ce6a1288e828d7eeacd356f2407542cdd4ae33ee172de
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5613dab71b44938eb88f25a221e209f94
SHA1692ed1e71e33434f16a87d4c681a1c330a797c30
SHA256b50f912500760a3dca6d08a0b37c0641aa58a7f885f8cd070bc70fe23e28c070
SHA512cb140c11bd30ec742d9e3854275d2b44032dfab06ddfe8387e496a6198cfb094d6f6cd0bcfdcfcc9580df92e52e79a43cc930470feaff84650f142bcc9d27202