Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
3cc28d4c010f691aa89143714dd1f953_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cc28d4c010f691aa89143714dd1f953_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3cc28d4c010f691aa89143714dd1f953_JaffaCakes118.html
-
Size
139KB
-
MD5
3cc28d4c010f691aa89143714dd1f953
-
SHA1
1ed423ccfdab7519a9d4f9d915c994637ded10d6
-
SHA256
0b49c4bb043a1fcb30919b0c0c4deb2e90c22bdff1ce0815f5bcae308a6af614
-
SHA512
77daed17e01da1c965ff7a6f1006e89ab90d38caafef1b7c1947c9ce9c64d0d666383781d35e229c180f6fff92b679b142da3a8f65decb7c52757539c4ef2da8
-
SSDEEP
1536:SMNSdtMncPTuN5Sx8lUZtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SMehyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1084 msedge.exe 1084 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1084 msedge.exe 1084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 4868 1084 msedge.exe 84 PID 1084 wrote to memory of 4868 1084 msedge.exe 84 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 4408 1084 msedge.exe 85 PID 1084 wrote to memory of 1612 1084 msedge.exe 86 PID 1084 wrote to memory of 1612 1084 msedge.exe 86 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87 PID 1084 wrote to memory of 1360 1084 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cc28d4c010f691aa89143714dd1f953_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeff8b46f8,0x7ffeff8b4708,0x7ffeff8b47182⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,3642988024971262008,13034949617091704550,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,3642988024971262008,13034949617091704550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,3642988024971262008,13034949617091704550,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3642988024971262008,13034949617091704550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,3642988024971262008,13034949617091704550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,3642988024971262008,13034949617091704550,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
6KB
MD598e31c1f737a57d3bdf92374af303720
SHA1d859c33117e9d99eebec45644e4978e914feaf58
SHA256f17c65b2cc84f7d7a0c009f232793c6edffc96ac1b84aff8a7ef700bec42fdcd
SHA512ba479aeb8fe91eeae3c8b78b151546e913c475789ae0b5437d200feb12869f3ad54dd3c959cd459e95e8fad670ae8a3cbf8252f81cd547559ccaf98e86778b0f
-
Filesize
6KB
MD5a74d2c052b3497348f335aed757f08ed
SHA1c9bd8b6ae5df3cf7d7b71265904d591bdef91edc
SHA256f240351511f28aebb68707bdf5181e5facd5ebc60a42886b35f033c2ad34890a
SHA5121df316923760e6e7b57b56b3eb9bfe8458cbd78742fe5e49f51012d667cd0fb082e665a864b3b2ace4d8b11a182575e6a28bfa50b4828f25c375faac75689ce8
-
Filesize
10KB
MD592ff36577eca21a7606dd18df4abb75f
SHA17af7e82f0894d91b5e04b29733e7fc12b7dc4648
SHA2566363eb2e4f0158b6bc0bba773baf8e4b7265064422993c407e02d0f98657e8d1
SHA5127e8427360007affa07f74a3f119735741d706267e07846717da693379477ad69cb6717a66ba17012a36c04e9333e78062df4811cf54da2171b851b91f4f55f19