Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
cee3926eff8b7101dc75d3f84f1f3345_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cee3926eff8b7101dc75d3f84f1f3345_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cee3926eff8b7101dc75d3f84f1f3345_JaffaCakes118.html
-
Size
4KB
-
MD5
cee3926eff8b7101dc75d3f84f1f3345
-
SHA1
fb6f985f157b532e1ef8ad26a7e7446e54f4395b
-
SHA256
1c947832796e8fed983b1129de98a52a1d8ff9e8fea4873a73d265a05c3811a2
-
SHA512
ef1c725f1c33057dffcb5ac40fe37886d11f320eaabced73bd7e131731e8e0fe07f6d391ca77a2542f92fa7ce800b77ed7ecf5286c0b59408209a0d029890db6
-
SSDEEP
96:Kn4/DLFY+MvCWosb4jdoKZoRPKh6ozzqsFopaM:Kn4rBY+MvCtKKWCzcpaM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1252 msedge.exe 1252 msedge.exe 2612 msedge.exe 2612 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2512 2612 msedge.exe 83 PID 2612 wrote to memory of 2512 2612 msedge.exe 83 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 4788 2612 msedge.exe 84 PID 2612 wrote to memory of 1252 2612 msedge.exe 85 PID 2612 wrote to memory of 1252 2612 msedge.exe 85 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86 PID 2612 wrote to memory of 4636 2612 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cee3926eff8b7101dc75d3f84f1f3345_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe9f4046f8,0x7ffe9f404708,0x7ffe9f4047182⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3507830751149321977,38495873643462359,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3507830751149321977,38495873643462359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3507830751149321977,38495873643462359,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3507830751149321977,38495873643462359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3507830751149321977,38495873643462359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3507830751149321977,38495873643462359,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5c815c8422b62be2db9849d8b52d6c693
SHA19499d75cf09bcc7d6cb0d8ca78860a53d346838a
SHA256bab9468ff856b1c7d0c3e9802a7dfcf1ec856797e1bd02f376ab5c5101927c48
SHA512f5a644798a13848becc196dba46117cf29eb02190fe1c2beda55eecb4fc83a86b8e344d384c1399d62c2dbe141a74f73ef299690d72750c97fe95e48b9e34086
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD5d634e05adf5fd23cc7794f37e593a709
SHA11a24e481763058436aee973a6100e046d788ef3c
SHA2567b424e14cf659a2f7614d4e76f2af4f023154c8c4e8e41a74ea5917718c0da7e
SHA512cb2e1c02e3581c92fa8fb30bcc3ae84e65b7aca6382fe4122bb1a1fe229be0a9772867b6f60384c4e7aeae4432a9766bfada303e3ae10983082c68531652c246
-
Filesize
6KB
MD502316a80cf3b17ac33b005f296aa7579
SHA18102d97a7f2fc0d458f2ffc187e56ddce04479ef
SHA256045c8ed412782dca9ce7c344a11da5e690632601c3784d732a3596bb02415b43
SHA5127c525fe509ca836bc2fc3ae9c0c65c27add7aaf6fbf9359c4c10ab1f3efe70d4b8cff4c22f2e6af358a3d60babe3e25c57f1667af4d6beb49509d4e5583be90c