Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
ceb0f15a8a712e2058812be168e3e818_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceb0f15a8a712e2058812be168e3e818_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ceb0f15a8a712e2058812be168e3e818_JaffaCakes118.html
-
Size
22KB
-
MD5
ceb0f15a8a712e2058812be168e3e818
-
SHA1
0a541c23952421cab1431e082e9ef237a7e3b44e
-
SHA256
fcceb7bd74bc0661e2f614fc42d8237abc65afb135d4c87fe6aedc806b1ee094
-
SHA512
d3987ee1972a35cd828114bc50196a6ae9b5c98df72da057e466f867e2ee5668874a8f189c0147f527f3262b210f9cd1b057222e439dbc2fd8b45ce3492d2426
-
SSDEEP
384:C9/Nohr5vycCHCOy8YX1x5rC3Nfosuvxr1TGPDI:CxNa5vycCHCx846St1TGPs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 320 msedge.exe 320 msedge.exe 3508 identity_helper.exe 3508 identity_helper.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 3728 320 msedge.exe 83 PID 320 wrote to memory of 3728 320 msedge.exe 83 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 4296 320 msedge.exe 84 PID 320 wrote to memory of 3468 320 msedge.exe 85 PID 320 wrote to memory of 3468 320 msedge.exe 85 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86 PID 320 wrote to memory of 1576 320 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ceb0f15a8a712e2058812be168e3e818_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff882f246f8,0x7ff882f24708,0x7ff882f247182⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8672429748397902209,12802325260931966041,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2352 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD53ad7c6ccab84814877130f2b0534d5c6
SHA11b79313e8c3daa0cec195ee4b81727ccaf09545f
SHA25640aa33267694e4df89c3da920b0b68b4d3d20d60fe7358761d444477535e5d45
SHA5124ffa22daff4e3ccee59a48afc2c1d8acbfd4d168b7651a03b81024d2cdc40760330bf06c92ed484bdd9cd41bb448693ba347aedc53d8392dc8d2ed5cff8b57ea
-
Filesize
6KB
MD537e06dd7fa85ebc2a57484c7124bc7a0
SHA150f997c67a060a87efa84118fe1033c96fe057cd
SHA256425e325aa3dfab7e8581b0501dd454704069b819500c988fe23b6ce1f612e199
SHA51221bd670e3a9f0e404558d6d885d1d5698dd9f85d3f1c703f267fd1082aceab71b7ace0371299bae1cae1abf559246622494aa019cf5d7ab2eedecb14d319ba41
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD533e5c5b689cb19f76e8e477d7be96739
SHA1f86686d736dc89b5a27a76870d2d7ab49e8c9d19
SHA256002e7919cf4bf4fc8f18c1df3196fa9835cdb0a6183c2ad5394688c881f79b0b
SHA5129a8c859b83f4a074fcf86e1a709e35261317d146491bc6a50311f6b375c55f99eb8331126c172f7184e145165f1a5dabeb117ef64f5182902ca1766860e77211