Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
ceebe11621ade565c212fd8ec7a88746_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ceebe11621ade565c212fd8ec7a88746_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ceebe11621ade565c212fd8ec7a88746_JaffaCakes118.html
-
Size
63KB
-
MD5
ceebe11621ade565c212fd8ec7a88746
-
SHA1
26107d0ca6f6302dd8867b01d1ddd220fe19d4df
-
SHA256
a6ffa7b225bb494a723871f56d277d21b6360a3419588b25bb4390a74e358d17
-
SHA512
ff6245e962cf8f343479f7f9a763949201be60e91ba1ce27beffb82010ba386831a631c0ef26328bafc4769c76146a1931ed162514accbd7eb87849cbd62c0c3
-
SSDEEP
1536:JqkunqOuPxwXEHphVC1WBw8nS7Cz9XJDMl0tohHbv:UkHOuPxw0HphsEnSmpXKl0tohHT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 1728 msedge.exe 1728 msedge.exe 1356 identity_helper.exe 1356 identity_helper.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2568 1728 msedge.exe 83 PID 1728 wrote to memory of 2568 1728 msedge.exe 83 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 4216 1728 msedge.exe 84 PID 1728 wrote to memory of 3620 1728 msedge.exe 85 PID 1728 wrote to memory of 3620 1728 msedge.exe 85 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86 PID 1728 wrote to memory of 488 1728 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ceebe11621ade565c212fd8ec7a88746_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffeebe946f8,0x7ffeebe94708,0x7ffeebe947182⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4473368688544747708,8200796433428633355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a4cfc2cec7cfd47e6055e06c1c59eb76
SHA1c4290df76cbc300b0ce76c46b524f72fcb4833f1
SHA2562227c2860d36c52b40e2a99ea6ba7b6912967cfe20b1e0d354a091a26e5a2753
SHA5128a4b9b619ba59b15dd68dc6f7e1b4b65722a11fb6f8908f229cc8e8d56dc603cf2e0fb59f9e427835d2b3d8c65473c9529a231853ecf3d26b99aa650ff504f45
-
Filesize
1018B
MD5d2a4bfcb7bccb2e0e910e106ed7f9bf5
SHA1a287b054cd42902fe20a97a7f3bbfe539e4d3384
SHA2561de4675a6823134759864a1a598496c5061dd44c46656d30ff244ca374100fbf
SHA512eb1c7c4123b61c6bb889ea956951346e2affc78a6a620db43633c0fac6ed5ba85d8b7b280181c3d363f7c4bc1f2b6c149be5b7f9c0bd86a90d71a7a7d16c4c74
-
Filesize
5KB
MD5eb301acd3263d089e1b67aa9636e76ae
SHA1d957b5642da12e5748e1b40931a5bdb26b51155d
SHA2566b8dc0a8c31d9235b1bab189c12fa8ff754616dfd077fca89b23f1b16c8eb05b
SHA512fd7f2af7a7d75d1a7d18bddd4ed8559a035fb2fafbdd9648330e76d4968b73e8b26eeea49fed060a8c6a27ec0346dc11670ca3f57eb0a66fb79ff9bf6a5878f5
-
Filesize
6KB
MD5e31472333c2672c4a6cf5c364a14234b
SHA1b164d2c90850b32a8a4dd07567e27321b71aeeec
SHA256de136226ee518fa449f484b02caaf16feb063ee2f250f948624825a85fb96382
SHA512a68edeae634a410de1af9496527aef0ac6b86e477fb7ff06ca018163d3c5472711b0d26b85ff6d919d06c9d2be78c3029c3ae62ccefc6824a7753d8a3c4d9dde
-
Filesize
6KB
MD5e6e4a4ec792af2738b08d6d7de074ffd
SHA1c2fcc013cbdc5762e4aed582d567753d338bba4a
SHA2564d3c297495bb5cf18cb05f0bb704b589e42c746a77bef73724ece17e60f49e69
SHA512e4467bb560e477bfb5ed9bbc72a4928e3e097b6179eb3adbe5a03d351a0828dd73e6b2a492684b63b443a3befddaae7348501eed93014e46ce9b98574d87f410
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5158e8a58109e416656d86f852edda341
SHA1783b5a93fb91688f0cf177228e20f25807b07ce4
SHA256159b8e24adaea832d3a5eb377d647f2d567b5715b1fb63f0be8f275688f84add
SHA5123bb5f6f3942dcd1b4a142c6a96bbc244c1c9dceac7762c12db5ea83fd3fee0087bf9a5bf828e077757ca2f273e251b65f1ba44b60b0b8ec9a7f315761db9cd16