Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
3aabe3cdc5d272125b5e2497f7031291_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3aabe3cdc5d272125b5e2497f7031291_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3aabe3cdc5d272125b5e2497f7031291_JaffaCakes118.html
-
Size
23KB
-
MD5
3aabe3cdc5d272125b5e2497f7031291
-
SHA1
a306ddbf326e12f5f726e1035a2b29bf8adb8e89
-
SHA256
418a1709b7de610aaa94a1dbd6cc3dc749838692890710303f8e2235693b7933
-
SHA512
c151f5748f559177d380c7fdd1c34eb581872b3a5833c1094290e801564cc72e6ae907ed1e098ad643d000c2964c6edcb0452f9f8d63c15add71a10df45b7768
-
SSDEEP
384:5lwgXEuMrt08GrAddlFGGOhENOtuR0JbtQk7JufJQq8PbKF:ggXE3R0538
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4808 msedge.exe 4808 msedge.exe 4288 identity_helper.exe 4288 identity_helper.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3344 4808 msedge.exe 83 PID 4808 wrote to memory of 3344 4808 msedge.exe 83 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 208 4808 msedge.exe 84 PID 4808 wrote to memory of 4420 4808 msedge.exe 85 PID 4808 wrote to memory of 4420 4808 msedge.exe 85 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86 PID 4808 wrote to memory of 1232 4808 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3aabe3cdc5d272125b5e2497f7031291_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf11646f8,0x7ffbf1164708,0x7ffbf11647182⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,10164743230135389493,18119941330874404141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
6KB
MD5484a7613204ca0b72a5e2a9cfccff14a
SHA156f94998d5de3c45643ca7b05cafc24e95c6ece9
SHA25662903c399c9c8f6bed65a0477207ade5f91ed47449e60d1eee9efabe2c4d27c2
SHA5123a170869b9f0aa52a617c23d7a96e81757fd29bdfe60de20b8c932d5f875ac9b8573180be23d345938b31e07064ceb0a42373f5f1ac67bc1d44b15044a7776c8
-
Filesize
6KB
MD5115cedcb59b135cf88c3c0ee68704bca
SHA139511e3d6f23d1209d510452d40bfa7df2e6a0c8
SHA2569d72fb6da932d0bf86d860ca393c4c7d0a62200fc5929fb41d53c94bae050834
SHA512be64f217be0a109855f0e2feb868c9198817429e89b54e00b5c3df28cbf8a6ef9f3867e00b688b5addd133e67fc6bafaad44bd3980b09c685429cee1e4155386
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD50ddc12dc2d5e4a80a455dfd9e4ef5f60
SHA18a13dca9165fc6dd5601aa02e41cd5f040aa6f7c
SHA256e9305b127906a8e0e1b094c410ec6a80c9c95ebe3584316dd8354f43725a9950
SHA5120ead349a56e5d1bb5bf7228f2d72a3ff2b711041f79589528c5125796c28a34525849a9af5ef93ec26896dfa2bac9bfccf1ca4f56f2bebf947d5b3e4e9e518bf