Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
3b3c8ba667d3f1df43c97651bcd81835_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3b3c8ba667d3f1df43c97651bcd81835_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b3c8ba667d3f1df43c97651bcd81835_JaffaCakes118.html
-
Size
2KB
-
MD5
3b3c8ba667d3f1df43c97651bcd81835
-
SHA1
c62ba7ace37c18001aaabecbff8ac33d9aa535db
-
SHA256
68f4be1705354a677270bb401e66466d44d00bf8202e6c4e55ffa4d64c7e0b97
-
SHA512
99c048e6b9b302f1d959e9de7fbf474dadd8b2fa2e5e563d1b9f81d905b8331845e82b591159f0d869d9ba48f71f3984dd59b7d7ee95eb871d3bd3a90dec0ca6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 4328 msedge.exe 4328 msedge.exe 4684 identity_helper.exe 4684 identity_helper.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4328 wrote to memory of 2732 4328 msedge.exe 83 PID 4328 wrote to memory of 2732 4328 msedge.exe 83 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3428 4328 msedge.exe 84 PID 4328 wrote to memory of 3776 4328 msedge.exe 85 PID 4328 wrote to memory of 3776 4328 msedge.exe 85 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86 PID 4328 wrote to memory of 548 4328 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3b3c8ba667d3f1df43c97651bcd81835_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a2d746f8,0x7ff9a2d74708,0x7ff9a2d747182⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4122904440872325482,6033302117996409570,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD52d47ee557894064dd2c9b50b33f2713a
SHA189f7f07202920b9e3dc20392e5c5d29f9c73b9e3
SHA2568beb2a4cf746a73c6a1b36b14d21c670e57a6f4ecbd844627bf2c617f19bcefc
SHA512db41813fc1262e929255ed3aa6a3d7a122f97902a06acc875bd96a4420b818c2fd04b657d690f522bc809db43b26ed8a8d68e91c49848e5f15297cd686fa9cf8
-
Filesize
6KB
MD5f3baa5d219c2c2a7bf6b35174bafce56
SHA11c7bbf93ef85252a6ee0791fa1aaf0d62e13722d
SHA2565b8a8bf2528c87bff7563e273596a185c1b119aba4681c58483e8ac51038cba3
SHA5126545b85ff29ca80469181d702a9e0552d720d7dd41da5385e34ea08840573cbb77cd14018978ec6df2ac06bc1bcc64d4e91496b32017cc81042ef01bd287c528
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54963226c57de61c2016adf54ccf499cd
SHA11a81f985fb28f8ce9880437a712673475db2dcd0
SHA256e6c0c06f85a5625c592099b34c66ab6463d2a8e6422d2caad7f5384b7701b09c
SHA512a9d108cac8967cee3a26a74daf366c15854eb1fea734d8ddd0611323a398b06999a527b5ede68f57e8501aff47aa79fd90ca7fdc90b8dbea328530e52e20f866