Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
0ceea31c8ffe2a63a3c08952e7ae6aad_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ceea31c8ffe2a63a3c08952e7ae6aad_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0ceea31c8ffe2a63a3c08952e7ae6aad_JaffaCakes118.html
-
Size
366KB
-
MD5
0ceea31c8ffe2a63a3c08952e7ae6aad
-
SHA1
1947cb06a5e3392326c6c41b39a25a02c6a4581b
-
SHA256
9ab58c9990e32a10cbcce6a60ed6aca7b3905ac732c3b103bc3309b920913e2d
-
SHA512
b573163195dc255a37e744cb766f11994245236d7a15ab7fa48ed664faf6121d6f0f58939ffc74bfb6b45632fe3cf78a8f1dabc412632b5635ade42320bc2d5f
-
SSDEEP
6144:SGsMYod+X3oI+YDsMYod+X3oI+YLsMYod+X3oI+YQ:15d+X3t5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 3984 msedge.exe 3984 msedge.exe 3476 identity_helper.exe 3476 identity_helper.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 1116 3984 msedge.exe 85 PID 3984 wrote to memory of 1116 3984 msedge.exe 85 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 3612 3984 msedge.exe 86 PID 3984 wrote to memory of 2220 3984 msedge.exe 87 PID 3984 wrote to memory of 2220 3984 msedge.exe 87 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88 PID 3984 wrote to memory of 3116 3984 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0ceea31c8ffe2a63a3c08952e7ae6aad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c4646f8,0x7ffd9c464708,0x7ffd9c4647182⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4867980246921940638,3408375557964774886,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
5KB
MD5ee239f29a56efb9007e316520fab22d8
SHA12f10c1e4962f228973c4f255236875d65b0d8a26
SHA256f7ea3ecd8351cbc0dd59c51234f29d69f0ebfb103eac8d307974f0804cf7cc92
SHA51209d17824b6f95ba9eabae1da1577f4e1888e7592be70bd912ba6d4f855bdf3d244531431007fc6442c9a413501b9dec3afd7646633691cc4b38a80d7a040e6fc
-
Filesize
6KB
MD5c85d2b721fe1e5dbf4f448415d70169c
SHA1a170ec6c182607079ab330780b5861c3e404d4e2
SHA256ae9c199307a33b01d77296f90d9c6c46f487529fc486c75377cb5d7764f0fca8
SHA512d5ab1e44c9d71d75605d05ef4396fb3c6c35963dfcedb6480a016e0b63100c25291437be092f984b70f390d99f45f0fb30c6f7c7b8e49880520ab65cc10dddb9
-
Filesize
6KB
MD52fdb92d66425115e356ee257db1c2e4f
SHA131c528ff7c34a194e5666bf75053687b2c0a7fec
SHA256e8ecdf98d1851e6a4ec3b3e605c8f74eba8eadb8fcc85ca524d3a566585d1ab3
SHA512540b660513d7f1417f4925b9e55b097df416d1cda4eeed463bca702545d76b835934a37de8f7c8a09786e73731774928be71cd2bf57e0f943da33edb4d2ea331
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54e0868c4957b0ae65643b2e2207cd4fb
SHA12febe95fa1c0c37d65655368575ff7e51e0c959a
SHA256af6d48f885477faeeae060391d4d5b461bc50226ebaac755925749ebe6e46f6c
SHA512340a651a3ae8535b2c59e77e986b06e34baf0976bd880f1c641a74814c54ed37ba252701442aa9494f3418141d9dfe3f23345be6f8f6b305f040c9dd25bdc724