Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
3be0a9dd012961270d154f7f2ffa4948_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3be0a9dd012961270d154f7f2ffa4948_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3be0a9dd012961270d154f7f2ffa4948_JaffaCakes118.html
-
Size
96KB
-
MD5
3be0a9dd012961270d154f7f2ffa4948
-
SHA1
d9f381da50dddaaf396f78de60dfaca2b0297ee6
-
SHA256
cc0d4480b9cee69615fabb6c3548ab1f017542f7acfa57957a86effff12c97d1
-
SHA512
754af57c30be407cafe40c729535a2ae96f3437ec32f09c756a44f6630e0e39788023c700951b9492ff9cf266b4a7849352090f41aca2a2af67b11a6bc1b9c37
-
SSDEEP
1536:5FtosvguEcRXNupAKIVpkXTtEpokRWstcLIUvftlOBwCVvofVDiyYaWX:Gk/u8pkuW4u4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 2808 msedge.exe 2808 msedge.exe 5044 identity_helper.exe 5044 identity_helper.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2824 2808 msedge.exe 83 PID 2808 wrote to memory of 2824 2808 msedge.exe 83 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 228 2808 msedge.exe 84 PID 2808 wrote to memory of 1432 2808 msedge.exe 85 PID 2808 wrote to memory of 1432 2808 msedge.exe 85 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86 PID 2808 wrote to memory of 4768 2808 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3be0a9dd012961270d154f7f2ffa4948_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccb0146f8,0x7ffccb014708,0x7ffccb0147182⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17838219257277532937,14885649920080545381,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD565436139f4c69aedb69c28b90bb51c9f
SHA134f7ca7e8bd2a7b4a9ea88586eb975d3067e9ba2
SHA2563063de326d0b97422852c111ecd89fb21050921bd2b44f3504d6736c1dc7a4cf
SHA5122cf67bfa36411dbcae2a451c40586a5f92b3353d73f0cc4e16fc6d4c7a867d7adb1a7fbef6b709c5936c12e796a615003a9531fd3c472a6160632ddf702e9f28
-
Filesize
6KB
MD5cf4dfb70ae01237a85ccc67db784652a
SHA138d4da735cfa499c16f7ea5043f4c3338c22bc70
SHA2562f28995b87a557cbd12240cf032f02cb42381ded6ee07d3671940d230485af22
SHA51298ce5130213cc2b48961281e90baee13067ea5402dc226b08b69514e3116f7a6b5c32beed0f60375ae5322a86bd791a4a6e6a1bc4fda5a4492c97d2fff362312
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5668c9726f70700a20b3af8c8c0bce6be
SHA1bf805f106cd067fc80c8693a09413cef29274792
SHA25660141abac28d950109e0e908d6e5a0a28f328b28d01085d8c7593896207a26e7
SHA512c65b259c429cfd9c6cf8de03a75eccfd4cc2ef0221e36bf76a26fbcd22879a8846b139cb36f824eb3acd7e451c987c39184c00aa0d15de3cc7d38a0124f6107b