Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
cecd46f9e2555cf98e89be65779b026e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cecd46f9e2555cf98e89be65779b026e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cecd46f9e2555cf98e89be65779b026e_JaffaCakes118.html
-
Size
10KB
-
MD5
cecd46f9e2555cf98e89be65779b026e
-
SHA1
ab9324092858968cf5f48c2c14aa4846800ca7b3
-
SHA256
ebac5d8803614ea288e5af5fa1148990e9a965129b3fbd284f02b66e511ee403
-
SHA512
e5727b82e6fb04a7f8b6a3a901096896ac9493c089bc3d7a45e74990e036959dd2dd34f7a1c4780410accafc4de51cf134d1fb3fbf3f4846b55988e3da80ab28
-
SSDEEP
192:CIUOMDn+JkVsomF7OvzLXM1ZaYqND9bQVpLXD9:CIJML+JkVT0OvzLcvVpLB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 1640 msedge.exe 1640 msedge.exe 2476 identity_helper.exe 2476 identity_helper.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 4552 1640 msedge.exe 83 PID 1640 wrote to memory of 4552 1640 msedge.exe 83 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 1296 1640 msedge.exe 84 PID 1640 wrote to memory of 3824 1640 msedge.exe 85 PID 1640 wrote to memory of 3824 1640 msedge.exe 85 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86 PID 1640 wrote to memory of 2872 1640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cecd46f9e2555cf98e89be65779b026e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8231546f8,0x7ff823154708,0x7ff8231547182⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,12414847092626811351,11491551770050015110,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4829218222c8bedb9ffe89dffd37095
SHA1aae577f33f413ec3d09f2e7ff5d9cc20a602241c
SHA25649239b229a2519583ba5d6de3702480b8a8ebf3cfaa8945100dbab25fcb02b7b
SHA51203e26a2e3de41b8a829b5543da504c7d7ccdc4c112d629efcac24dcda23acb50a52b5b99572b5efb2a01cf392a457cf9fac85663b3d63f7606be00dba218f8f1
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
Filesize
251B
MD5300203d1295891a3c3b6b891a5243022
SHA1bdce7d4b8a95d7687926e7fa1d3837892fd3ddc4
SHA256fb6205a05942a91c6b2f2f5db1b4d3182317c66ecb4a0b4fcecf5c7aa2091574
SHA51241e91900c02daa76a43035eb850e30467fce545cbf6e5083fa083d23f28b91adf059c660b23dbc8e1bd7621104676a221dff37c3b479283237e74054e6364681
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5f441528b5452473d521b6fc2223b6f69
SHA1a1c71005420484a30e6ffa22432451cc77b8c2d1
SHA2560c6b87dde91ac8368c03c1263a930d4b60860c23f04b204c6dce6b8f620017a3
SHA512684532a6c41f4d58a056e170210f7d7f0c9c4e206b0b4efaa121ac43321227777918a0b0a976d591e8e476410c31cb6ba6a8d4658803289a71f7e40474d514a2
-
Filesize
5KB
MD509a1f8662c35ce732034f6f25db70da7
SHA17fde4f53982b0b9f84e25bcfe72a4b61733f391e
SHA2565753099571208c0d4c289aeb4c95b4889a99444f76ceb26cff011990ef29725f
SHA512d888aa60bd11019c79b0333fde7fb1ceedca313ef1be9a90b978b5a76ce4a73a707893656e9d42d75d9582d5445faa0dce2a0eeb15b2a4b83eb3e870e5461661
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51a723865d4d1f3a852849cc87b0e4bd9
SHA13589e7d2206ea4ddd4d24ebba01e302cf00a11c9
SHA256a338a63576f1982d23fc72222042a444782359ee6d38bff6cd91a5d03fc2afd6
SHA51210ec328c0a1305e48797fdd4ef6058f6c63c63590c9aa661401f51abb0ae800fd986a5b1f66f7eec3c65d66168581e52e6b85c812b9cbd59a0cc9bacb5547ee6