Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
ce072b7993143c1c1189b7d65652b4d8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce072b7993143c1c1189b7d65652b4d8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce072b7993143c1c1189b7d65652b4d8_JaffaCakes118.html
-
Size
41KB
-
MD5
ce072b7993143c1c1189b7d65652b4d8
-
SHA1
f54170749b517f71b5c0d8726942dd7e9a2e24af
-
SHA256
bae80479f5121fbbe2d7bb9726894cde562f356096dd73395c2ad9f7ae4d496c
-
SHA512
0486194406b40bc51a1d0c206aac2d9d7d241303466705e34b1f85f1a959e6612ddf35e92a78cac56bee41c787a350806c94aba794e0b6dbd8d734931f27a477
-
SSDEEP
384:LISxsqYtCNmz6ZZw1H2IrlWwDl13rwf3dL+Z2apMyebhNBWn5OLO9HbKNqziu6il:L997w1H2Yl13rUkgNA8LOccziu6iVV5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 744 msedge.exe 744 msedge.exe 3280 identity_helper.exe 3280 identity_helper.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 452 744 msedge.exe 83 PID 744 wrote to memory of 452 744 msedge.exe 83 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 4164 744 msedge.exe 84 PID 744 wrote to memory of 3444 744 msedge.exe 85 PID 744 wrote to memory of 3444 744 msedge.exe 85 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86 PID 744 wrote to memory of 1988 744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ce072b7993143c1c1189b7d65652b4d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c0a46f8,0x7ffd9c0a4708,0x7ffd9c0a47182⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,3931282022135508127,3056309726650909906,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
412B
MD58cb95ecb2ef15e93086ac11dcaba009e
SHA17b8e3a31db729182749dd0dd87758deb952a674d
SHA256ef21e41ecba2c799ab6cbfad9af39d22690a2e1fc165e62fd6e4ff11508b9c05
SHA5125d32d269f47875216ccc1268a845de1fc99a5525368a5ca434a11ea9aaa94e645f585b884bd725c7ee65926032cdedb6f7bf7cb6e675f2ca4f65f31dcd64f5f4
-
Filesize
5KB
MD51f0884abc9a199487d502d7d8ec1848a
SHA1165a1dbe331a601e8432aeaf3f14aaff0617b6c6
SHA2565c20900a6f28cb085e9800b231c2bda98ae2751616d919551ce4e20fd81e43bd
SHA5123b69471ae16c17b688554480c0750f7399cd8c6531647a689da0da83b89d63e8de1c5a9feed15225e2bfb84ad16afe450af37bab93e13cb307dfd6238744c017
-
Filesize
6KB
MD57e9d16dff97a19a96b932264cfc4dc31
SHA12e2d4437455660aaa932c8b05835106c44dc302a
SHA256659ca916753b12e618b703c5dc7d11427fc85f1f34224fc1abd60ea381a96e97
SHA512755b31060e7ea27d3be59e02f5098b0385ee5b4c2f3627aef854e62a2209f8d9d9722fe8be512dd63a8ffbda2f66c811b75516f4606ae4598d4db915fc02009a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e691ad121e2af2300a8918231bc0acf7
SHA1904e3f40a95f8636c4ca2978c1fa70e0111c8ecb
SHA2563b30ec6eb818c0e16aa2d755c3b05f76ba5f8774c345ff1986d4050858e3199b
SHA512dbd9dafe74eedf8e5bd41b655b85dc00900226055580b7149826521e13a5aa56ec297a26b4f585d0b3566ce7e3964d0d2589be315b509f560def1ae7df045b2b