Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
ce4a593d7a873a9ba96b7c185a4f5c4e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce4a593d7a873a9ba96b7c185a4f5c4e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce4a593d7a873a9ba96b7c185a4f5c4e_JaffaCakes118.html
-
Size
122KB
-
MD5
ce4a593d7a873a9ba96b7c185a4f5c4e
-
SHA1
2d1567f5efad08b34d0973412bd35d03192da140
-
SHA256
2dbed8189931af2d40b23ccb5c6a2d95717cde166974b4e0b7fe0f2d9c4fc740
-
SHA512
ac4cec00f52b4f3d81827e6171276cbd82e0369c974bdac1853294c6387089ae618de6e4e28f5217c6ed27877294c23264f607dff546c2b9a098158bc2e1499c
-
SSDEEP
3072:oA3yVLN1RV4g4p5xuaXUzOSjHGRUKhCHMbo3zjlkDJcHIQTUzOSsSH7DzjxfQy8T:is2MUzOSjHGRUKhCHMbo3zjlkDJcHIQV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4716 msedge.exe 4716 msedge.exe 5068 identity_helper.exe 5068 identity_helper.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4440 4716 msedge.exe 83 PID 4716 wrote to memory of 4440 4716 msedge.exe 83 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 2792 4716 msedge.exe 84 PID 4716 wrote to memory of 4192 4716 msedge.exe 85 PID 4716 wrote to memory of 4192 4716 msedge.exe 85 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86 PID 4716 wrote to memory of 4148 4716 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ce4a593d7a873a9ba96b7c185a4f5c4e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34c46f8,0x7ffcb34c4708,0x7ffcb34c47182⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6836350431644690532,9427122024237515930,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
951B
MD5c109478c12a7e77083071e4ddae79f7c
SHA1e4491d3dda77d29234c6ca9e464914ded8c5edb3
SHA256be36c086df486ee98d9daff1f64651e82ccae8d88918cb335a92e43a1a226f78
SHA5122411231c490ec3dfc9d8515fca58ee604e4484409e23913ce3c4e027aadbb4934076dbe0eaa7aad852bf85ed0130ad07369c41d002b6911334a809ddcb7f7e33
-
Filesize
5KB
MD5b25ad3754fc3b88e03ac5a1e546ca979
SHA1001d9c2e3ba3e1dbfd51fe8cde09b0d6c53430e1
SHA2560df3a4d9544cf985aa11415cf345f0e215c9cad9d1363c938f6506a8c25848d0
SHA512b67926cc739903d1ebe1f4d4f502daa1d2339e55462f5a3ae86f50f4df58327955e8e393bbbf1030ec61444cf6301fa73888b2575e4c4fed1573c099c5e8b357
-
Filesize
6KB
MD575a278c88256fd0645314b1df5e84890
SHA14f9116d5517eac0c18308956966321ff2378c7fb
SHA2563268887d007ed7ac9b99a18c3bbd9645b65bf30fe1c713951e49542fe2291866
SHA5123c07ee4fed0935c920d46bee3fcdc8b0b2ade5b5ea6b873f08c23e18860f433acddbdc91ba47cbafa41beef095b16550992f7b96a5a0b57fb0466c5ebb6459f2
-
Filesize
6KB
MD5c49d4d73b29dbe39f8c92818ce50c075
SHA1234e872b723be5454d955471b29ae244bb771ac3
SHA256fcfd1f65752d2d990372b126e00fbcff9ed49ab8cef09dbde10d9eaa8b43907c
SHA512979d5312baea1e4c703ee91a23316dfbad5137676ed2c45b78b3faea0ee882572cb504c22276baacc6e4cb12f5ffce84901bccda59cde6445d6ff0b57f2d8606
-
Filesize
370B
MD5916b3900e2cc077f8d4b0602a19665ca
SHA11b33c98c7974a0d612a8b21d661c3b51e76bfaf1
SHA256a190181cc61070ebe85f3fb0251aeb7f33d4733738e5b6608d9da2e617fbcc32
SHA512d3941888126fb831ea0023939830f24b226985dea4a2b073001d7edfdfbebd69117fccb4d5d489945e0c4c24b2ff7a8f2e14a0780c4a5c7707deb8fe5b83bec8
-
Filesize
203B
MD5b20644ea291ecb6bd85e53e67f94184c
SHA1b385cdce6a5e7d129ae381be480ada6b8401e480
SHA256a8d4dc6508cf4d29b2b4191b8c952c860d098c138c453dc88a16637b3c457259
SHA512c710c666e10c3c0dc7fd89b7ddb0be642eea38e44256ddcf77e990e05d663d707f90736aae85491bb32d06d0f88da3de1403541a143ae3c991c32b55fd191401
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ee73744b-03e1-4cc6-9628-eca429c7cc0b.tmp
Filesize6KB
MD557b4289890f27a7626ffc390312029e8
SHA1374b2a1b14fc30b37cb14af36799dd6b01cbb5b9
SHA2560083edcd7b7db03141a3081eca368b40ddae7550f817345f1a7c113ade972e85
SHA5128a4eafc4774443edf16a27a7fa3aaf7ce8fdad24b5c23a1a3dbb18b98a3d2aa557989111f1166fb944946b8c52236e345a54c69e03ada890f6c48c3084582c76
-
Filesize
10KB
MD5e2844c94dd38e3fb9a9f0817d98d60f4
SHA1d4d90f86c0a6bdcec94e421bf8bbef95a5ca1705
SHA2565f008c3f93d6a95e3116f4ba48188726d6237a910bbb4935dac0094031bbf3d5
SHA512fcaf03de40e93d7f7fba39ba88be6db6decf8cf974a2ba1f0e3d54af7eb7587d4c0185a23d60e1f6683b89293c2aa32bcfe822eafd99eb4e7555b2edc64d0d8e