Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
cea4757af3741b54ed112513ef4952cc_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cea4757af3741b54ed112513ef4952cc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cea4757af3741b54ed112513ef4952cc_JaffaCakes118.html
-
Size
22KB
-
MD5
cea4757af3741b54ed112513ef4952cc
-
SHA1
343e06cba5cb0e76f96efe41f4c8aff86cd1ddff
-
SHA256
961880e7f4eb2d1fba8b00a4c6750d7274dffded787c0d91c39e3a58de430ace
-
SHA512
a2fe64ea526c32383d639bc379fe0aee5f2526517656e502d15ea739de3182f8a4e16cebe03250948b0be3a316f203109490cce05cb2771a3bf58087fac8fc5e
-
SSDEEP
384:k8A9qbn8mQ0Xw9h1QDM9Hpr42sWxtH3PSwyRS:oqbn8mQ0XwVQDkCWbXPSw5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 1736 msedge.exe 1736 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 3284 1736 msedge.exe 83 PID 1736 wrote to memory of 3284 1736 msedge.exe 83 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 212 1736 msedge.exe 84 PID 1736 wrote to memory of 4120 1736 msedge.exe 85 PID 1736 wrote to memory of 4120 1736 msedge.exe 85 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86 PID 1736 wrote to memory of 1160 1736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cea4757af3741b54ed112513ef4952cc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9ab746f8,0x7fff9ab74708,0x7fff9ab747182⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10819897798926351247,15849722597524410368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10819897798926351247,15849722597524410368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10819897798926351247,15849722597524410368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10819897798926351247,15849722597524410368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10819897798926351247,15849722597524410368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10819897798926351247,15849722597524410368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD534e839b55f46136e7f4a04e70d3ebd46
SHA1c62ecd121a3995148fb3b3e35df4a53ec89a3d02
SHA25637813cedd5a0e8473e9c1e433a2bbed0792231e940aa3eee6e6f8404da041ac4
SHA51223223b8190791a401d8b2e09a2d1bcd11a5ff23db69eab9be8cf3534d9f734ec6dc1ed156f4001ab87a964250dc76db630b4eed0caee4e41cbd77ff535c681d0
-
Filesize
5KB
MD5013b463ad5883df8d39153c69bc382b7
SHA16922b7a4d858b212f93c25841c979b7bc73fb1f0
SHA256e95dc27e1fe18705e68f822e41f8f919c5082427c7dcd7060c7c37a70abb7cbf
SHA512d15fb1bd883a31c08eace1ff8d47c99b8358bdae644d84245921d8db25694ba6bf3826f5a784daa5440300641a237c1d8d4fe6a70bdebb5c86806cafe341bcb1
-
Filesize
10KB
MD54aa13aa1dcc961d0a35e0d99c6ff30da
SHA12678aad765f4c3232d23175a6029a312a0986051
SHA256c803419988141f5432ee47ab13842c6f973c34dd7c338a138a1f8fd45db2ffdc
SHA512eb49c3086de9bc2d82137cd9ad4d65b55a74951967906380e879147e1aa2b6be31e95c16f0980c871e9231893aae591d4f3be08f3c94dac87dc045015bf0a658