Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
3ce57be42c1270dc6f2a5a4d6f7f9835_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ce57be42c1270dc6f2a5a4d6f7f9835_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ce57be42c1270dc6f2a5a4d6f7f9835_JaffaCakes118.html
-
Size
139KB
-
MD5
3ce57be42c1270dc6f2a5a4d6f7f9835
-
SHA1
e4d009e358dc50bb0f3a71b9cfe384e10717af68
-
SHA256
3495b0ca60ae6733a42012f69dda1143ac76d5e38354df5de9c7d370d010ea33
-
SHA512
7f59abb82d2eabb0fb71c8443a24fe494d828b2f0ac7e098735d5f9190fb2556e1dc28acbd07d29592ee997db283ef1f3db305692364b6358566f061d92c94f3
-
SSDEEP
1536:SiFpwyIdx+mp1O0ni3DVJlayLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SilDVGyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1084 msedge.exe 1084 msedge.exe 2032 msedge.exe 2032 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1852 2032 msedge.exe 85 PID 2032 wrote to memory of 1852 2032 msedge.exe 85 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1008 2032 msedge.exe 86 PID 2032 wrote to memory of 1084 2032 msedge.exe 87 PID 2032 wrote to memory of 1084 2032 msedge.exe 87 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88 PID 2032 wrote to memory of 3196 2032 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ce57be42c1270dc6f2a5a4d6f7f9835_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc634746f8,0x7ffc63474708,0x7ffc634747182⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,2304301178280772295,10081418379143129268,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,2304301178280772295,10081418379143129268,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,2304301178280772295,10081418379143129268,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,2304301178280772295,10081418379143129268,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,2304301178280772295,10081418379143129268,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,2304301178280772295,10081418379143129268,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD5001383b9ef7ae0e22a25a1a44aea4de5
SHA171ea2de688dcda75570ff02e0cf74dfed2fe81f2
SHA256bc8426a902ae9789d3704d8858d9ed3ea802a599e55493fdbb6e91d030ee77ce
SHA512c95e01de5d475b0d0d92ee446494a6ab50307f49f99be83910e339ca6a09eec8f1f061cecb824e8fe5da93c0c4617ca73217a6530064f39a6a9eb8ac64ad7157
-
Filesize
6KB
MD5975f3d478d72d0f7c3f1da2ac0c72a72
SHA13f11d24e7b18ebc9238bc5c62f662c8b37b172b0
SHA256755a3ec144513de058b2b998dfbe2279f33562a46844a80aacf8855c5e3fa5d4
SHA5126014c7783d3738b7cdbb3879148084f640ae3dd72490a9de202767df4b8f6fe037975dac9830060d31e241a7c76612a2f3c3b828f0b32e55bfc148da5db5e4a5
-
Filesize
10KB
MD5c1ee59def0e1b707f4a4bf8928c3905f
SHA1096bb14a19ad0b95f5651a27ecd07616483ce2a8
SHA256ad91ec4247c32924538375b1f9d3afce154b337041a77ffe63c6347297e6fa6c
SHA5120b32cf1de121ba466baafdc78c51e29adf781b764924e51298ad07e3c48a0a0db199d4019578dc43f72d8c0f3d970bef59ca9f0f68d694f11431263ba62e64e8