Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
ce57a0ff2108429503c536851cc8baf1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce57a0ff2108429503c536851cc8baf1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce57a0ff2108429503c536851cc8baf1_JaffaCakes118.html
-
Size
27KB
-
MD5
ce57a0ff2108429503c536851cc8baf1
-
SHA1
a6618bb5562c12065add26ea38e4dcee1e31f849
-
SHA256
0a09f3940f166527d90c8f03f50cba860affa521292bd6f923df8fa91874ae5c
-
SHA512
95a82050514bbc2f77ff4887fd5d1ed971195f6e059af57178d65aa14d020bc054a416513c613997829e7a8a3ea3fea07bea9acb7360ce3b5127270210a3e5f6
-
SSDEEP
192:uw7hxMytf4smb5nEw5FdpsLLYqRgE6nQjxn5Q/CanQieu1Nn79dnQOkEntI8x9nD:7Q/hfoI0pSKF4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 992 msedge.exe 992 msedge.exe 4284 identity_helper.exe 4284 identity_helper.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 992 wrote to memory of 5036 992 msedge.exe 83 PID 992 wrote to memory of 5036 992 msedge.exe 83 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 924 992 msedge.exe 84 PID 992 wrote to memory of 1456 992 msedge.exe 85 PID 992 wrote to memory of 1456 992 msedge.exe 85 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86 PID 992 wrote to memory of 636 992 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ce57a0ff2108429503c536851cc8baf1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa33e46f8,0x7ffaa33e4708,0x7ffaa33e47182⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2288,17063221881672496102,15934061319473008053,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5177b114f50a3082001f184b421bac4dd
SHA1c66ad7b3ed638729bcf76f5af01822b82732c1e2
SHA2564840d249baa7a5dbcfdd21afd3cdbc8e9761c7d370b48af0c98899a8f6694465
SHA5121abf98777b7a871b398c77658ed57368ce077ecb23f1b76a0f515f88384c2e479837cef980f6a54890e1a4bd30c6466865088449f612ef15495a42c4861d74c0
-
Filesize
6KB
MD5db04200d5fc70ecfe09342445dff4e82
SHA198beb97b5c248c71fed95ae2e6243867b5ff36b2
SHA256b0cc56b1303eadb910ebec4ae64241f380bc29c2a4c8669c8db2c9dabc3cfc12
SHA512c7ba43ba16ae285a214f2912095dc16fa9da6f534a55d337012f753454aa94e3eaef7d4244a18fcd1b9cfdef1e62f26bd3122ae62e2a7196ed042562376aa0be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c44b2cc673b775bd0e59236b242c25f9
SHA14a47150dd310847002c7bddbd1a5a8bfff8dd0f0
SHA2564268bcb6bdb874fc43c438d2e93b5df00464036e7a7250d644f89a2a03b8b32d
SHA512e4820dfc6dd0e771ed7a5154d4c8e563c44876ae29ccb359c0fe64102deedec48f256668207b5e6c1008715f2607b03fc9b84c44f28e5782a69d0b76f575b07f