Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
3e0f670887aef2c540cb8bd392350fcd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e0f670887aef2c540cb8bd392350fcd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e0f670887aef2c540cb8bd392350fcd_JaffaCakes118.html
-
Size
66KB
-
MD5
3e0f670887aef2c540cb8bd392350fcd
-
SHA1
312dae8aa009a28764114ef1a04e12d153c0b9aa
-
SHA256
ab96f9a730d756511f3d66380b604db66f42ff186a3fb7ab63ff7ef4e05343d4
-
SHA512
a179f8fe5baae4f3fe1a8cbb1727f9458d5f61345d3d84ebb8ab8a091867a1e60dd593a574343c972df82b5c1420dd26925f59008403112d384279f710648da1
-
SSDEEP
1536:c236HVhU8sfiJZ6C7F2alOlPQDJuqnjEpVRkn7xgonjEWZqR50:1co8sfcv7UalOlID0/67xz1ZqR+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 1640 msedge.exe 1640 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 4580 1640 msedge.exe 83 PID 1640 wrote to memory of 4580 1640 msedge.exe 83 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2072 1640 msedge.exe 84 PID 1640 wrote to memory of 2588 1640 msedge.exe 85 PID 1640 wrote to memory of 2588 1640 msedge.exe 85 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86 PID 1640 wrote to memory of 5000 1640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e0f670887aef2c540cb8bd392350fcd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffcad9f46f8,0x7ffcad9f4708,0x7ffcad9f47182⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7836065113015901203,4117826203594061321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:2748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
Filesize
1KB
MD50d0c0d3a5c22bd6f03535621d7b73c9d
SHA16789203a55ed15bffa2ad7d47fca6a421079103c
SHA2568e4d2db96b07764ea646aed2abcb629cce90dc492bd780d6c82ecb89ed782679
SHA51271e14d5ff3b4e5af2080cae78f5192a7d349ca32c6a93a6ed27f29b41f37a621c883eca227fbba02dd7f5da7177ca87c7864c99aff3cd791b2ba2ebdbc432136
-
Filesize
1KB
MD52aaac6c5aea32c131bff2afb4530ae88
SHA102c4a0efe689c9852c8215882a27186c2ebca656
SHA2564d86bd11173df5cfdfdfc88c0ff0efc3963e1cdcd3d179b1adcf764174d57a9a
SHA512eba0876f846f16085dd601559df2a60513b5c0daf32012ade199ee5ab7088bbbdfbaf39faa15304919a01c154d011c4f55661c19297e15112c2e97ab988133c8
-
Filesize
6KB
MD5428f2b093413829686d42a10028e4e95
SHA11a24e3d8141ee0361a1d6c4ed0d0b9d5d0361506
SHA2562e28735d46010c6509f7972b87f58f7bda30226179ceab455f4c34d53a1c9d41
SHA51287c74674cd0930e6c041e7c790dd3f15c00b361e93f700fd21921c0e2ee60d70b6de62f3c21f25f1294ede8ff12c858a18fafb72616cb4479c3a1065c7a9d2f7
-
Filesize
8KB
MD505a2a0420269e1115f3803c1a4e55206
SHA1939bedaff3da5ff294d73fb995d187575969c600
SHA256dfcfe5828b367570bfed73976b05021cdf2f1a87012b68253eeba82966a721ac
SHA51268a9ed61f4e0ebaab9d1e7dcae013a981e45717a948780da1c9b3e0b40141138e5cdfb13d3d8d8976d97181746bb5357d9ab309ad033ee2a41397b883f431480
-
Filesize
6KB
MD57074f24d2b0e8ffab8f936a564e133e2
SHA1fb42556edb3d39ee5665431003616f4d6852b69a
SHA256d3ab793739b43ad1053371cd72638a0ca946f554febc1d0548fbc6f1b47dd597
SHA5121ede05a2f2c73e495d6846b2045b9ce0d02b3ba62c37b059590cc9d34f178036e2b468814be37b021c3688f80bcba6843040bb6f9251568d3e2fcda35c0caf6c
-
Filesize
371B
MD5858719d6fd612edb22bdb23fca9db4af
SHA1ad4f64fa6fc4a78e81389aa8fd31f9466d67e3e3
SHA256b9129dc78ab2dc84d394f9a2ba01bc619223efd5e7ece0ed7aa83ae623a4a663
SHA51266c8a972eb88ae1684f9af72768d3053dfc76ea6f464819d2b6240070e21cd322039a727e455f4a715dbf3b55c7c19f317100e4eb5ce37bcb5c2e83382f8f1cc
-
Filesize
873B
MD568c16744bff67a88af0280bd5401660d
SHA17ea27c626e2a96539d214f3f2fc2245802a0eeb5
SHA256ef3d55c1bdacad4c53971e7f05ca76d150cd9c1e469ad3e18dda88060390719b
SHA512b3c3b0dfa33cdec4220459b08583b24d8d1866de7824a5e27418c011c9221060ae6f7883d1827cecf41826dba7762b8ea9c98b102854967d521f9894c7829662
-
Filesize
204B
MD51683a06f87cecea83caa67646e7a5a91
SHA150533c681a4a2090d47e67632865d11d5182b634
SHA25650caaca858e33c6818b9230f12d2dc93a0bd11ca7f150868b85bce83681cf409
SHA512ca441f5dfa31c0501584f3e45aec19698a12844b280d4e2bb90fa4a357710382005941acf846523e702cd8367be59724d6eafd6343faa5365f8cb3b712df1967
-
Filesize
10KB
MD5c3d82a40f06f412fba233df24f461e9c
SHA106f560c62f903f165a7cb6742e8a87a3fcadb00b
SHA2561d271a6f04eeb8cb438d0de98a55ea72c5f62b30d8b449f4747b83d2e2566d04
SHA5124c2e74d831b6aacbee50882baefa999e6b14a8c1289c4f840a63db3930fd9c66bc82b86bbf13a2c7399ab8579aaec0bdf5fd5dea44ec0808ffb218b151e3de9c