Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 00:09
Static task
static1
Behavioral task
behavioral1
Sample
ac2948663d3a5db8898d625e14880c1d_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ac2948663d3a5db8898d625e14880c1d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ac2948663d3a5db8898d625e14880c1d_JaffaCakes118.html
-
Size
88KB
-
MD5
ac2948663d3a5db8898d625e14880c1d
-
SHA1
5ca0e025cb8824edc8c15fb93acc07b17611e0a9
-
SHA256
11e64fc916f9288eb8cc083f530c210130c945bf13fdb9a179ddeb95232a9909
-
SHA512
a8fcdd316eb4bc0e799fbe248804f13b01d140817bc9702acda00ec5a8cb9f57e75f49521aaf2f0eb26be667a93f397bac1fd2e1a7da7f1caf7433f262140105
-
SSDEEP
1536:2Rj5oW21fOU6ge1WV5YB6E5XB+K2xyRylQLrimBZzNQQkPffu2mc:VW21fOU6ge6EBRylQLrimnzNQQkPffuU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 4624 msedge.exe 4624 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 3956 4624 msedge.exe 82 PID 4624 wrote to memory of 3956 4624 msedge.exe 82 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 4772 4624 msedge.exe 84 PID 4624 wrote to memory of 1624 4624 msedge.exe 85 PID 4624 wrote to memory of 1624 4624 msedge.exe 85 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86 PID 4624 wrote to memory of 3472 4624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac2948663d3a5db8898d625e14880c1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,2182676597771708472,10329836480643586551,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,2182676597771708472,10329836480643586551,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,2182676597771708472,10329836480643586551,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2182676597771708472,10329836480643586551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2182676597771708472,10329836480643586551,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,2182676597771708472,10329836480643586551,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5f77c815e412a0fd71158b1d899b20782
SHA11e466974bdacb76ad6b4cbc348472b73ed0c59c5
SHA256baae60fbacfbe17e3c596a9f46c024522c38cfbc77cb19500c535250dea28b19
SHA512a576870e66599a1f14b0d0350ac647f705c9897708d6eff4c1bac3af78f557d4efcd0fedfeb928ef783a44eb6b1cb40c8b131f8a5ce22dc7539100b423349ae8
-
Filesize
5KB
MD57b45bcac71dda1da212e7b788a0f434c
SHA13b227d3db7a1ee202d0cdbb5bbc3d7b042f802d8
SHA256628788c8af9443a61d0ee9e32035b618b58de982561b0d3b284cfa6a7abab74b
SHA512571c9f871b4191832387c0a8cbe60ad3018736693fb033004140d11908522edd46e8833dc6ec0bdb30ca2a9a431695765b9e285e414bcf48b1bf64c24f8e2919
-
Filesize
8KB
MD57d40d9c31e27c4219f18a930e43d23a0
SHA15d2731326f004558a8bef48fb5d13d57402d1212
SHA256977344dc70bb794c02494f6503908eb0e22fd5f5523655f6d7733acf71de9e89
SHA5127e3dee9704682c2bd5817dfaa56c7e4e2cfc48840310346fb192760756614514381ace6b812bcec63788ad807ac7622313b99dde7495f43b1c8c3652f4e91000