Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
3ccc064238214b40a0026ec55b550a63_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ccc064238214b40a0026ec55b550a63_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3ccc064238214b40a0026ec55b550a63_JaffaCakes118.html
-
Size
19KB
-
MD5
3ccc064238214b40a0026ec55b550a63
-
SHA1
85ce0bbf742d90d2a078b73d17b3029caed80644
-
SHA256
ba5328f6ac8382b2043e3522d45e0f286abdd91419f1c8a145272ec4f3f6aa41
-
SHA512
8f364cf735985a29b3f556afd0b5dc25442f5a0a275b631b14cd6c118c339c8ce7d81a25255c8af87976e8a7343efc7fcda8f0485a7533f44c002f578cf60b6b
-
SSDEEP
384:0T426xkrsx8b0hr/ubVRO9gQ91TmhIqp0cYAeLP:VkSGxg9gQ91TmhIqOcY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 692 msedge.exe 692 msedge.exe 4380 msedge.exe 4380 msedge.exe 1528 identity_helper.exe 1528 identity_helper.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1184 4380 msedge.exe 83 PID 4380 wrote to memory of 1184 4380 msedge.exe 83 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 4024 4380 msedge.exe 85 PID 4380 wrote to memory of 692 4380 msedge.exe 86 PID 4380 wrote to memory of 692 4380 msedge.exe 86 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87 PID 4380 wrote to memory of 2840 4380 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ccc064238214b40a0026ec55b550a63_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccb0146f8,0x7ffccb014708,0x7ffccb0147182⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14368453747156534418,7188468345352324612,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\04b56843-d847-4df5-84ff-1ef9b79611d3.tmp
Filesize6KB
MD50043deb86b9eb6e664c5c381132f05b5
SHA1dd6f401b4787847a56eebcb1d5a9723077c5901b
SHA2569026672cec13bf5d8781c5c59f72eed3b7dffbfbcee2693f35fe304f14ca2c90
SHA5122185507429ea1b5e729765ae86655f51950686375bc26ae958e226890132376c7782147aa832485780e932f3d1ec8d73ebfc50d2a291043b6c5e96fc27793f8e
-
Filesize
186B
MD51458754278f7102f93ffac76f859bd46
SHA1281850e622652e26ebafd0fd3afd43aff8d68604
SHA2568799ff47ff6ba85e9758ed3696cb89be62f5907f6bfd6cbd1f65f342c807d498
SHA51261fd0ba23e1a73af1321d1d3175121886b7f0db82776b415aa7968b083f302975eacde41c8ba2f9ae8e83c9d8ef67fdcedf8c4bfbf8932a93027e2b6caa1b296
-
Filesize
6KB
MD56d358f9fcad05916b8096b8b724fabb8
SHA19c3377ba5546b61cc42fcef303f80f4e441da3b7
SHA25616844c43172faeaa40fc49996e8d491c1cf444dbe9437385b9f438aee30eb6d8
SHA5123b218335c64cbc7beeb5666792452618b31d85af7d237f61d7ec9a02f161dccbcd9874f2688fbb722cba0ecb28573cb91c1bfac31062fbb24d742012f589e5ca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dea6ed4414428a4923463f0d1a5c4274
SHA19ce6214be270a60f0bdbcf55a0dfff5004ad2ba1
SHA25627a154f7231e765fcefd444bdf0ad6ed681e8e026528e4fb4a4e394eb1bd5a3d
SHA5127f955b06d3987ef9b525fb04889bae61530a16392f8fcf044c76e375d123db4ca9a939a7417adb0f12bc0341a18c214b6490ec6f944a775a488daaba80380026