Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
3a16fb7c68b5a28f91c67b8433d0b849_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a16fb7c68b5a28f91c67b8433d0b849_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a16fb7c68b5a28f91c67b8433d0b849_JaffaCakes118.html
-
Size
9KB
-
MD5
3a16fb7c68b5a28f91c67b8433d0b849
-
SHA1
4c75793bdebbf1a9f48c39a502db401f29c22249
-
SHA256
be5268a9035e972fd6287e5407306c571975ab57bfff5295c1e1abe4322cd6a4
-
SHA512
5c99ff580d7fd26c39730d6ecf2d4d90a9c485afc4728e3f8b5034fb60226814202af18b6e203c449e347b550aa42c36a7413a4293fa854dc5c3482d49d8b62e
-
SSDEEP
96:gLeIrYeIW1eeftm2xO7EZ1sQB8x9CZlX7DehcpOpao4TdtGL8sq2roHU:do31eCtm2xO70G3EBMauA0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 4396 msedge.exe 4396 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4604 4396 msedge.exe 83 PID 4396 wrote to memory of 4604 4396 msedge.exe 83 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 3724 4396 msedge.exe 84 PID 4396 wrote to memory of 1712 4396 msedge.exe 85 PID 4396 wrote to memory of 1712 4396 msedge.exe 85 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86 PID 4396 wrote to memory of 368 4396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a16fb7c68b5a28f91c67b8433d0b849_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e86746f8,0x7ff9e8674708,0x7ff9e86747182⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:82⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,3607899686934613036,16847643751623200190,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD566890b3c027d8eff629acffa29b3e9dd
SHA1fc3f4eb5b0c22e04d5f3c08fefe8e8ca903b59f0
SHA2566638139b0c6ee0f08e1ec8ca15a02c39cf9bba5d8f562aca6bd533fcaeb72a78
SHA512fe13eb83332591251843b6a9df85d2ac824beaeeabb2eb934605fc8dacbc5cb2162a6663922f50b4502617c9cff1597315dfed79481cc9007abe98c726b95da7
-
Filesize
6KB
MD5dc0e272988afe9d26186265c56216963
SHA151b31cf618dd35edcd05ae0c3a2dbd83fc97a519
SHA256627b077bd2a222548f51301a3fd148055447a0d977c4539e00911a2ae394fed1
SHA5125402f568c67a65950cdf44f4fed281bf47e582ea4bf8510e78c4345a188d3acd242aa671a15208d6859cfeea848150ed06ea5354638f9037940203ef9ee1a246
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d570f20a2a2e31b695f761a9b7836525
SHA1f0fe2c854fa4ed8a7e7dda130e31af59d3dcc1b8
SHA256d494cc202510c601c7dbdb237a6cfd1f4966664d450d65bb7fa6a934668c7984
SHA512f3bdc6fc81b38c2a62111f4ea913a28f01d1a549578aef7b1c613b5ba15c3e74ce7fcf2a82b6859bf7a9bd44b3ab01a2cfd98ef6a80e9a5a608fa01b3973c477