Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
3daa18ac4e6a9535dd8e01c7305e7c2a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3daa18ac4e6a9535dd8e01c7305e7c2a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3daa18ac4e6a9535dd8e01c7305e7c2a_JaffaCakes118.html
-
Size
88KB
-
MD5
3daa18ac4e6a9535dd8e01c7305e7c2a
-
SHA1
794dac8edfadb1a16ad16266b26b93179ea9a6bd
-
SHA256
9a3ca4c4db8b7f2b76b128fb974d9732ead1b919fa02e5422dc95dd726006427
-
SHA512
569f84c18ae3e618f5be5939224df43ff5c4cb7eb9d051230deb8cd4436976e255160c3d633804215f1e020dd2e15f94800337f23ae38d2fe95d7dde333aeba0
-
SSDEEP
1536:nm436ASWms3ASWmsmASWmsVf7ASWmskASWmsJkASWmsfASWms0ASWms7ASWmsVAk:m434fZGSui0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 2804 msedge.exe 2804 msedge.exe 4244 identity_helper.exe 4244 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 3292 2804 msedge.exe 85 PID 2804 wrote to memory of 3292 2804 msedge.exe 85 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 4992 2804 msedge.exe 86 PID 2804 wrote to memory of 1016 2804 msedge.exe 87 PID 2804 wrote to memory of 1016 2804 msedge.exe 87 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88 PID 2804 wrote to memory of 5080 2804 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3daa18ac4e6a9535dd8e01c7305e7c2a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffc01e846f8,0x7ffc01e84708,0x7ffc01e847182⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,18230791867334003555,16103994519347540543,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5100 /prefetch:22⤵PID:5096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
6KB
MD554d6d6d87c19857db910eaf628cc08d2
SHA1b47e3e3b4e294ba13435602667166df9b53b38f7
SHA25604f8c5bf84d88ee2fd475649e43c0c436b31bf94c6df8caea6b8e734d79fe627
SHA5124bed230b35fbd8d1d2df98bdf507a8bb10a48ba4eb48ef7af0bf414587d7abfa240f9f79297e886246cca4dba15a420b1657f2e48e24dd900591b19e85e863f7
-
Filesize
6KB
MD5a93115aa1f29ddc6afb43c1e73af4bc5
SHA14f1d34b37a4e417df3d807c2f08d18e9af4cfec8
SHA256cbf0c96af509ee1e08af339066ab3dc963df567f0ec61a5edc28aa8f9ed8d3bf
SHA5123bf2f5c3dd2ab5fc597287e2ffed39538e95a4e791630bcf3d4ef23dab24176f6690f88115ab3ab6138f9e87d30c0dee3677bc90d29589eb494c86d32b081ecd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54f5bd1c3d27cfb52d76be9e1fed24c3f
SHA1f8f0134ed858095ab650ae9c14c823c30307157b
SHA25645fa71e524c2b7483c9b7dd0d3f208bc19f3504be3d910f4de67cf6f736f870d
SHA512d4b75341d0639487b03c5866170d434aa9c965c2c8cf64f76e98bbb5e2c4b272c8a9bbd150727e2190c9a2ea80058d40a34decbe38797ed051564ab4b8503ee5