Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
3ce2f8d7eee2bb152446da1c04ec4171_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ce2f8d7eee2bb152446da1c04ec4171_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ce2f8d7eee2bb152446da1c04ec4171_JaffaCakes118.html
-
Size
214KB
-
MD5
3ce2f8d7eee2bb152446da1c04ec4171
-
SHA1
efedc5f623d39cf1342a42dea7edd218ae20ce98
-
SHA256
364c175f8d62d82beaba4d16d3f8c1f8cb951588745c0d4b2b97e06271e73a81
-
SHA512
c6a95ffc6d7e0b41c8a506360ff3e0e79a0a4fa27f16f4052162ab6982d8a35daa6032fabd361f08a4532ff02570f6d9db6dd9b15228cfe10106ea1a24a49179
-
SSDEEP
3072:ArhB9CyHxX7Be7iAvtLPbAwuBNKifXTJl:Yz9VxLY7iAVLTBQJll
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 2692 msedge.exe 2692 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 648 2692 msedge.exe 85 PID 2692 wrote to memory of 648 2692 msedge.exe 85 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3632 2692 msedge.exe 86 PID 2692 wrote to memory of 3260 2692 msedge.exe 87 PID 2692 wrote to memory of 3260 2692 msedge.exe 87 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88 PID 2692 wrote to memory of 4816 2692 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ce2f8d7eee2bb152446da1c04ec4171_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1dc946f8,0x7ffc1dc94708,0x7ffc1dc947182⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,8715630262845560787,8365484858961774000,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,8715630262845560787,8365484858961774000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,8715630262845560787,8365484858961774000,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8715630262845560787,8365484858961774000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8715630262845560787,8365484858961774000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,8715630262845560787,8365484858961774000,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD514fa8eebda5bc04ea5eda20c22a3cf86
SHA11dd7dca667a53f52a0778333a3e81f063e9fe62d
SHA2566a053d5e3576d274d6361e9f9f433ee3c1e3777d1bdf762606791c857933cf09
SHA512dbc8dff41cd989421cc5beb8988f91624079a290410c4a11ad19e683906625ba0e1c3ec6c333817bd9da22ef3112960ab74fc63cb390ff574431d0360b31351a
-
Filesize
6KB
MD5d417f0cfb8c19623bc053bb891356113
SHA127021d1835b3cf0dbc0e55bacb38afba214aa4eb
SHA25669f5733c4a953530d25bbcd9e10f1e97af081ff0487c7d465126ba4a572604a7
SHA5120758199fe5d539cd3d0ed34837bd3749c5ca07affa60e9c50b8ce0a1dc6ee4be88bc388d3e8ec6b53f7601fbcb97dbf98677c95e9af71e8a3ec42845f6d242ae
-
Filesize
6KB
MD52d18496d96bb51ad6c342fbae60902e2
SHA11c01567deba6936c7c2cd154009b27784922f3ca
SHA256dc5a6275dc04ee1f1a07b6d7729b42b87e398a132270c7c823344fe146ef1a1c
SHA512cf4125f6771eee5bc3ae426cea1238aef2967b41bed8c9c91d54f08e37e93832ed91325dd5baafdb66977a6d9b2c819dee7e160d1522153aa5ac58c75dff94f2
-
Filesize
10KB
MD5f229af995e5e186ecd26f2b489e46972
SHA1c1ee51300ce57f19018cc0fc415f37d63ec63cdc
SHA256af2bbfe78fb8a9c42e73c40135ffeddfc45eddf146356291c664fcfed2fe8cba
SHA5127d5ec80db223bffca18c9ea4088211169a3fad2bece33bcb304ac968f9e2bceebe46ed18e0f659165a30aa71f229abe7100e85739371d5ab515deb2b44df3e48