Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 17:03
Static task
static1
Behavioral task
behavioral1
Sample
ce1a42c9eeeb82640ecc8be1691a50cc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce1a42c9eeeb82640ecc8be1691a50cc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ce1a42c9eeeb82640ecc8be1691a50cc_JaffaCakes118.html
-
Size
140KB
-
MD5
ce1a42c9eeeb82640ecc8be1691a50cc
-
SHA1
220788999d36fb3d1597e73c1fef0c53ce9c61e8
-
SHA256
9cf89818f876e1336269406ee7ba28dd3e67abbb442f27b43bb0d804ec949a51
-
SHA512
eba02dc803602bffe7a2999735ae6c67f7d3b54b19e7e716a6dc6c52d4d099348372a8ce011fd708526945ea614ad3f480a4dd3dc5c7b2a72423738d43776806
-
SSDEEP
3072:KHW2fCaxRinNPjoi0wKs1q1tI5QWa6/8NjY9cuWMvSCtbrRDQlHB:KHWtC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 740 msedge.exe 740 msedge.exe 2324 msedge.exe 2324 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2276 2324 msedge.exe 83 PID 2324 wrote to memory of 2276 2324 msedge.exe 83 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 4320 2324 msedge.exe 84 PID 2324 wrote to memory of 740 2324 msedge.exe 85 PID 2324 wrote to memory of 740 2324 msedge.exe 85 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86 PID 2324 wrote to memory of 904 2324 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ce1a42c9eeeb82640ecc8be1691a50cc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff267146f8,0x7fff26714708,0x7fff267147182⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13880709087124189274,1718248158146704913,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13880709087124189274,1718248158146704913,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13880709087124189274,1718248158146704913,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13880709087124189274,1718248158146704913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13880709087124189274,1718248158146704913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13880709087124189274,1718248158146704913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13880709087124189274,1718248158146704913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13880709087124189274,1718248158146704913,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3492 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
948B
MD5dbd12624a97f7d49ec9fb10db501815c
SHA1ec442a4fb06c7a6d233f4b2f28be0c7db5544220
SHA2565c1e0f8862a2d457e2d2c5fe5dfd96a4be27532990db4aef848ab94d117b0fb0
SHA512fabb3921c1a53da59cb7b3dbb04b79a701c01635e9f7c30351207fc21ba4f727d71b5a0642b9d06307f2ac7cf5b3424bbd82e21f7d212a0a289165d1a5e59aaf
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5fe8fc38955c0dc690761c2d7ec0f1f7c
SHA11fd5ad24f2854f34851bc0d6d4597928bbf30488
SHA256e51503fbd0942dde55a89f87c19f6f74fcb2b0827483848e87024c9219aab201
SHA512676f559020314f35ee45d7c9854876ae1d0218a1984dfa8be9d8719d41323aef36abd8e93d0705279f59d12a8a793c0617dcdcf3f927ce4337cfe9dba07f5f5d
-
Filesize
6KB
MD554dd04130221ee1ec6dba34723ca9e96
SHA1985c3ca66257c64538b4590c619a1aa200fd286a
SHA25614acddf6a5c60a619a61a62c8fbdbe1c0c1bd83b81d4f07edef5c8e175cffff4
SHA5123533006651a57f8afcef4c26e389861fd91426f128c1ef9c772e1b6b3fc7eccc0fc6bd7d5ba71275c55188940ced687939bd2544b50c6a3a294216a883993fc3
-
Filesize
10KB
MD553244710a66a542024146d40bc6bedef
SHA136dff64ccaa197848c6f3e2002d433b31bc971d2
SHA2569d5c004520a1b90cfeb94d18a89c3915b3dfb187c74acae5c5690073c62fbd9d
SHA512b1b6ee6540b03f736635c83457b8b980634e06bb9d462744d1588aefd04b0cbc0cee14ea82d18afec79b735d89bdabed75e1e3bc5f9cd22e0df65abae10d5f4b