Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
3a4d9f603716f73fc124e5742ee5ae85_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a4d9f603716f73fc124e5742ee5ae85_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a4d9f603716f73fc124e5742ee5ae85_JaffaCakes118.html
-
Size
7KB
-
MD5
3a4d9f603716f73fc124e5742ee5ae85
-
SHA1
cea6c4eb3a358ffbb009099c9ef0cd7880cb6ce3
-
SHA256
2facc64ef5a607813361c0c4027755a5b87afdd1680987f831413a385da7a659
-
SHA512
bee1792afdbc60d91a8a01c0832c571bfa29aefe6fb2fc20ffb06b85bb55575e34c32b4e0cf8fcf15548d2d5c78d2521ef2fa7ea87db67ccc5a76510a64550c8
-
SSDEEP
192:mNcVd79H19W3do+dp5pRphpdVt+NpZpJp9p9cC+dp5plpdptIcijU:mNsCdp5pRphpdVMNpZpJp9p9cPdp5plf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2060 msedge.exe 2060 msedge.exe 1764 msedge.exe 1764 msedge.exe 4680 identity_helper.exe 4680 identity_helper.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4564 1764 msedge.exe 83 PID 1764 wrote to memory of 4564 1764 msedge.exe 83 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2124 1764 msedge.exe 84 PID 1764 wrote to memory of 2060 1764 msedge.exe 85 PID 1764 wrote to memory of 2060 1764 msedge.exe 85 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86 PID 1764 wrote to memory of 4300 1764 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a4d9f603716f73fc124e5742ee5ae85_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6b9e46f8,0x7ffb6b9e4708,0x7ffb6b9e47182⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14303174104479796044,3530577818039593036,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
180B
MD50e8b1d11fa46e47071865a28eb6cecb8
SHA103a790f63e678f78904e4880faf6caefe24dea68
SHA25691366e90923c3a915b4aa65118604ea138c535cfaed92eef39b6a21a3f689779
SHA5125d5962cfb066f27e8677cf837893786b242d8bff146c90eda27a37b0a2a29ee54044b9585a6063f4c679b91ba61c2e8fd589c0a668cb009219f7ecc512594324
-
Filesize
6KB
MD5bc42e8ffb2c3ada04ebdbd5e4c3fe1d8
SHA10d66ea086cec43e421186205b6a6b4cdeff94db8
SHA256ed5f1e83720f779e40698925df863f7941dee6ae7bbf871daf344290f9e17fad
SHA512ae2d97a380feb2c3f42db451fd8a916a8377bc56a030dc7707a83eba226aa1f0b6c2a797c6e7ac601654c61366cb45518585a37d94abe5d92b23222bb3552831
-
Filesize
6KB
MD5f850da381bfcf00b1b2e57255bb25c7c
SHA1bfe746727ded80ad91aa0cd544af58d2300f4130
SHA2569a04c13a04885f23b25ccf8e4d99108b3a0396876d175108df2bf192c2364d16
SHA512bab4cb780737d84cd2accd031d975b199c641e9b79b7ded9b1fe15aad4983ae60ba32a9128c881e3cf2c118685e11f1e31d0711e6593c18d2871ba6361e194ab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD513f024b1caa9c654e8d9ceb219b79b12
SHA1df7f0a7ceae2376656e076fc31523b89c2898324
SHA2560439dc6eee049f8e8cb7efe56c907a74d045b4ae2c8aab48bc830ddc83e09aab
SHA512c82f1f8f7065e7c58676174023ec619cfa74c98040eed6e4903fced2cead0df95b952cf31dcd5e2c4f7f492f6b7be5d32906d66ac3ee673c5ae9f7f38f17e661