Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
cea3eab62cb5dc062856c4074eb8c684_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cea3eab62cb5dc062856c4074eb8c684_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cea3eab62cb5dc062856c4074eb8c684_JaffaCakes118.html
-
Size
22KB
-
MD5
cea3eab62cb5dc062856c4074eb8c684
-
SHA1
cd09f1f0b0882d8c6e53d5f9082de83d910d9e17
-
SHA256
1164674b087f29c1bc3031177cadfae8d7896c0f95584ad95d5f9e5375362b80
-
SHA512
71b326b50b311f4db990cbb0022be69fcae63bdb86514d20b7a953af7ab8b0fcab45a080e80e1c87e6bdfe5bbab09bcaecfeb1df1fa6c2449af9866e6fa7a878
-
SSDEEP
192:uwP6b5nTwpeUnQjxn5Q/fnQieeNnw9nQOkEnt1FnQTbn5nQmS9xN5xHMB+qnYnQp:qZQ/mySxUr0k
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 2456 msedge.exe 2456 msedge.exe 2192 identity_helper.exe 2192 identity_helper.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2284 2456 msedge.exe 83 PID 2456 wrote to memory of 2284 2456 msedge.exe 83 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 3936 2456 msedge.exe 84 PID 2456 wrote to memory of 1724 2456 msedge.exe 85 PID 2456 wrote to memory of 1724 2456 msedge.exe 85 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86 PID 2456 wrote to memory of 4716 2456 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cea3eab62cb5dc062856c4074eb8c684_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd70fd46f8,0x7ffd70fd4708,0x7ffd70fd47182⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12651151932106625991,5063115146202284079,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5560 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5017ef3aab3c445dcb0301adbeb62776f
SHA1bf735ca6e5f978da381d57d6568553272f232afb
SHA25644638f2efef97eb4b729d92532f179eb2967d7d00f4c2a426e4d3d97a0a79539
SHA512b1461907f79bad40cfbb1f0c0c82769710c4c9f466c2d9b54666534d65d543bfef8e3075a8db9ce7741dd58e49edf4e4ede668e37f58841b9e31f2b9082970f4
-
Filesize
6KB
MD54b3618656b9152635115e263477cf582
SHA1ccb308cbc5806a3320705119405b9ccfa5e63bd0
SHA2563707226d66ad7dad977764d1c6a812bb46dd905bdf29212e53d920ff97dbb0c8
SHA51248e684a0227d9fc46e576c75915ec88199021435396c8ff26c9c1da673c98d7efe30c2d7f3f46cf6cd92cbed3d613bab87ca1399020e0fb4efa8231a127e400b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59109a27983018ea0ce4749f6ffc7feb3
SHA18af8ee08d34f0bfd6f2b1257d4914f77c1c6dcb3
SHA25670a5a200231605e6387d58cd7a19116de0060ccad76c0fed3460fc21a08a8ca2
SHA512234839aad0fa04f77f094a48b3bc358930b427ae0dfced82ee8f697a39b8bf62aff3cc021a90fbefcf1d3b42f5905dd966b163d62afe75feb353f89b8912b3c1