Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
3e8f42e866071bb1f0e75b255b00e3ac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e8f42e866071bb1f0e75b255b00e3ac_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e8f42e866071bb1f0e75b255b00e3ac_JaffaCakes118.html
-
Size
8KB
-
MD5
3e8f42e866071bb1f0e75b255b00e3ac
-
SHA1
e6d1770bc27781e7211a89479481443950cae1bd
-
SHA256
4ab7a4608ef9a963d4267f36b27780ac60a13307431659961417e3e5a84cf46e
-
SHA512
06deb74ecf7f23a7f79d44bdd572f1ce029a9ae285737cbe9987dc262231eb1b1d026719f6d6bd17537f9c54eedc7ed40438df5aac7709294d563861d8fc185a
-
SSDEEP
192:j5fIK4QFuBPA6OziSXwIyiToYD0Ig0p8sg2:jB0BPXOu0wIyiTD9TCS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 464 msedge.exe 464 msedge.exe 4572 msedge.exe 4572 msedge.exe 1696 identity_helper.exe 1696 identity_helper.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4316 4572 msedge.exe 83 PID 4572 wrote to memory of 4316 4572 msedge.exe 83 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 2572 4572 msedge.exe 84 PID 4572 wrote to memory of 464 4572 msedge.exe 85 PID 4572 wrote to memory of 464 4572 msedge.exe 85 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86 PID 4572 wrote to memory of 4876 4572 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e8f42e866071bb1f0e75b255b00e3ac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf8d746f8,0x7ffcf8d74708,0x7ffcf8d747182⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,12167121054458357783,7529056005157331629,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD55bbe064b2fdb9ee449eff22373a0d9ca
SHA12a3cfab99104b05ab83dc59ded8aad9acb0a95a0
SHA256a43e3ccd0652d8d092e88115caf86c7a5619d0e9c7ddd3354c2c2eb067227f8e
SHA512e04079732bb18fcad5720176ff8b3b31991e837c377668e8b3c5479d5a1dd3f09f8ec4365cbacef64c917be9ca7ec8efce105317e21011ac757f54412e4c4636
-
Filesize
1KB
MD556a70cc4a5087fcb467a80607719b23a
SHA1fb696c347a230923097e0eca28fd551a2bfdb926
SHA256b0dc736eeb61079c137f2ac0f861b952a018da6b3841647225248bde655ae41e
SHA51222c9814da6ea4a3ae3ea98fd570adccf91181e30df3cdbaf2754c417fed76379f15c2a566705756455158a7b17678afb3cc95f47b9a30e50e69bd1a4c750d447
-
Filesize
6KB
MD530859f7bfa1646a6db7b53941a3a0c47
SHA1b178d56f8e9ab224f1087e9269f65a4b71fd5098
SHA25614f7fbc8c4a7b53701768193d33d164c543c2c130e7e4b0d435d05efafc1ce2b
SHA512f056431e5f93358189be79c51140c3471c1a86685ecd0b77d25e1d280e4fc28703245f8c196aa938873ad8ce31f7826c3d8151a53f6e5ad1620b320ac8587671
-
Filesize
6KB
MD544339be5aa8afd6e18e3058fb2e209a8
SHA1589ee9d4ef00df8809a5b865f61d973f3ff619a1
SHA256390e48d20884a2d344da5ed239c20af7e38fa219d9ea52377e510d644b98ac0d
SHA512040219a5978e2bcb1efd607f1ff652a3133111fa66bccdb2efb1b32cdd2c533b6ebf6ae674a26b1909d712a28510652c1902c87da9e2f442dff69214b382717c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD552a70496e19e2fef52b508799d51b01b
SHA1414ed52dce773fdd3ceb537b118b5a4d454c8b9a
SHA25622d48959338d46e7f55572637c839744fabd35346693690cb85bd3710e1bd6c4
SHA512d98e867fbb695df4dc2c56f74c58e5ce34c52a42e78581f8564507e886240477bf0fe9e88735905b1af672e9102d9ae36ef7eadb31afde35a8f79d9363137560