Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
3dc6f463845dff64e12a6519c2a0992a_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3dc6f463845dff64e12a6519c2a0992a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3dc6f463845dff64e12a6519c2a0992a_JaffaCakes118.html
-
Size
12KB
-
MD5
3dc6f463845dff64e12a6519c2a0992a
-
SHA1
f9a050f8b3f2e673171801f851088df9a5930192
-
SHA256
55134c770911bd31759838379f0d8da153e26373d67980ffd968882d7c07feaa
-
SHA512
f11a6df85a695086817b863bf19d2e5fd8d64c7d3987b5974682bec64d7eb51eff84ccbe2b390ee294e9a9c284b9705c011eb27a8ef220407dc47ff8c0c6be9e
-
SSDEEP
192:F7CtwoRB3m/ozBycqZnN7E8SQDmAa5TsZ2taagOAd2SR:F7ezlzocw7E8At5QZWaagOAZR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 944 msedge.exe 944 msedge.exe 4956 msedge.exe 4956 msedge.exe 2316 identity_helper.exe 2316 identity_helper.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe 1008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 5112 4956 msedge.exe 83 PID 4956 wrote to memory of 5112 4956 msedge.exe 83 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 4324 4956 msedge.exe 85 PID 4956 wrote to memory of 944 4956 msedge.exe 86 PID 4956 wrote to memory of 944 4956 msedge.exe 86 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87 PID 4956 wrote to memory of 2624 4956 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3dc6f463845dff64e12a6519c2a0992a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd364b46f8,0x7ffd364b4708,0x7ffd364b47182⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3632 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2740 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,3262871586610364546,9299838722921687389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
6KB
MD5ea0a6e06c28e633e2bbb535907075f3d
SHA168ad3920e56c9b47e706c91746dd060258d17a0d
SHA256500d0ac0e19a9cc07572df5f32b812fc7d61024bc069c189a0c52237c6edbb3d
SHA512d82d8e574a69b64ec376c748b30f3dd2bb47b19676e3bb74759ffccaf8a141a1fb86e94eab248ed8ea030ade77c4a627d795f3ed5d63362078f710216718bff4
-
Filesize
6KB
MD542dbdd19bffa6431e0c2cc5ba5e85fd7
SHA1eb5f6d8ee9147f0c0a4e82c99cf75817bbfc9b9d
SHA256acf3ded6ca18b36aec826020f0a9e78809617f27605f2700c1e3edfb4d26e8bd
SHA5124448a18e49a583401d2472723a1418f601cffff927a7dbe0ca1e42485cdde634952cdb6b3f5c4f144e89d26f494de57e853217f1161a7e54903921b4f40dd8e5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56ff4b17bf109dddef549d3cb02d75e7a
SHA1db0e070e1639f304cc29e4ab46a60f600b9c9398
SHA2568573590ee51f03cca4e07b0be543ac9d0f08decc0ef275762d4a06f9d1be4b5b
SHA512677c79005f8666bcf4d75e2b82ca05cb265e79f1ecbc649a8fff639a3ff05a137b822fba7e4714c96f4636574b8a04d27b1b9ec62fe8d009253f78aff8b7c77d