Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 11:20
Static task
static1
Behavioral task
behavioral1
Sample
3f8d98895a1f0846dc60c17769d5eded_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f8d98895a1f0846dc60c17769d5eded_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f8d98895a1f0846dc60c17769d5eded_JaffaCakes118.html
-
Size
58KB
-
MD5
3f8d98895a1f0846dc60c17769d5eded
-
SHA1
86f728798c465b3f71aec28f97e4dd90b07263cc
-
SHA256
afdce9e5ff7318378b247ccd1e161323d1a28890d474d57c7b8c3a782e94e8c3
-
SHA512
998e52904369bc4095718d18b749092ff384f4e6673cfefb4841fc30d49054d04b22825874ebd5b2f041fb79c21220b5ddd1a51b08211659412aa8e0c43abb14
-
SSDEEP
384:wwG7vAZ1Cym9KnjE5vq1egaf0gkHc/qGTQty0uh/mg3hSdKnJeg5BTrssEAT1nQQ:wECy9fGnhgFdy4fQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4868 msedge.exe 4868 msedge.exe 2188 identity_helper.exe 2188 identity_helper.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4892 4868 msedge.exe 83 PID 4868 wrote to memory of 4892 4868 msedge.exe 83 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 1468 4868 msedge.exe 84 PID 4868 wrote to memory of 4720 4868 msedge.exe 85 PID 4868 wrote to memory of 4720 4868 msedge.exe 85 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86 PID 4868 wrote to memory of 3376 4868 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f8d98895a1f0846dc60c17769d5eded_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa202f46f8,0x7ffa202f4708,0x7ffa202f47182⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10328361138858423824,11403680940076976831,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
337B
MD526c46f40bff4a2467dbc48caf7d38770
SHA17f6cddee2df566ec577b15a7152eb07c387cbdee
SHA2567d0f494f2e7c61ef49b871092c1ad7ab8f138fe84c7c52ed1ffe04f1f89081fc
SHA512282943344c242cf0e3f471d57bef98e896f5513b8c3e03c1f7fd13e24662954836125ef1ce3684e79c405d1e4de17d6e0b2b23f7163f9904be520beaff4a69a0
-
Filesize
6KB
MD5268e20b24ccccca1fd59c347a2425f24
SHA19509da931f0fea923784fc936e6a2603ff5883da
SHA2562c880bd20129456d7fba7b1f6a882eca56508a2705446d251a821f90b553a953
SHA5129c12bbc56f31e14b5a01c5cb252c13e6bf8da164b936354a6d21b130878fb167ed0edfaa739d73010203bb5a77b5474fc65c17dea1e5299e0bb5eba110e2dcb5
-
Filesize
6KB
MD528850ef20d3e3b2d7a732d08ad46117c
SHA1eb1e29f46188e3ad395e05f01df419ee753b5df9
SHA2569cc77958e6dd21ded63044ce0e4321cc083a057cb9b91135c8a1ad3ba482d744
SHA5129035888abff0e9fa911e31fd81f793c90be7fbf36554abe5e5907a4ffaf831de82598ce5a1a26bfdcc306e02f7b5eddd541442622aab385713131388106953ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD538578cdd35fdd50cb4f4c8d020904a8f
SHA1dfa14d3b75bfeaa8ee747475cbdc91b9917252e1
SHA256dbf4ea02c826328397406c0ab01c7cfa3c288966c24432c55fa70a6c4d4a7e59
SHA5126efdea328c79571ab5c733cbcac43acf27624477768f212e44cfbe2023bc8e7bfb35c84695a86735b23f16db0d6e23678da6c06136a61937df5baeb57d3ea284