Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
ace76e94f6825ec94562a638791dc90e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ace76e94f6825ec94562a638791dc90e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ace76e94f6825ec94562a638791dc90e_JaffaCakes118.html
-
Size
39KB
-
MD5
ace76e94f6825ec94562a638791dc90e
-
SHA1
bb37c0b27a5d917590a4abeb9bb42ba3955446ee
-
SHA256
51d0b5d6fb264660dfd75ce52cfdde94a5b4b2b5c5fa61bcd8906cca88866841
-
SHA512
ce5b2e36c273289a4d7c97ff79069d838c35f34aa24ba2f6e704a0d78c6f4aebe3284042be9cd9155e21c7367400f50dfbaa5edfa6998d6d7bf50be628c2c5dd
-
SSDEEP
768:u9KhzJDIpBHOmjd6SoeOUZIHy2PhVXu41A0zx0YiFYn5akBpQ0qgudl2SoOL:u9KzIpBHOmjd67qZCy27+41A0zx0YiFJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 924 msedge.exe 924 msedge.exe 428 identity_helper.exe 428 identity_helper.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 924 wrote to memory of 1464 924 msedge.exe 82 PID 924 wrote to memory of 1464 924 msedge.exe 82 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 1492 924 msedge.exe 83 PID 924 wrote to memory of 4488 924 msedge.exe 84 PID 924 wrote to memory of 4488 924 msedge.exe 84 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85 PID 924 wrote to memory of 212 924 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ace76e94f6825ec94562a638791dc90e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff12ef46f8,0x7fff12ef4708,0x7fff12ef47182⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4320 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,16461013698896782889,6694263660518286136,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD55dbbe4a8c4ad46dd7ba7c86d1e1dd5a9
SHA1301175260809524865867a65ffc34656aef2fbf6
SHA256c63c655562efe01cb957773c4f0c072c61044c7f33e1c5dd6529bdd85e136df6
SHA512209d68997358b7158cbc08363d0fb2680970c06dcb56a400a31bc91f13fc78d4efd9d5797a4fa0b8523a747205aa2da04aab81bbe44c8a7e48782082560df424
-
Filesize
6KB
MD506a02b47eeca2a275cbca115a2f7b21a
SHA1529631b2a19e96070fa761e004d11d33dd80a6e4
SHA256d3fe9dc9f3ac704dd5f9d203e803e9015c6cda797d0768aa01ba03b76592f97f
SHA5128c424a6424100db4298aff299d104b4deb35e432cfbdc1273c758e2f73016913cffdc5bfdd3077c36eef9c6f8687d24a7928adb113fb00b57788851dae2fa3a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5df5548f7828ff06dfa48d04ac46eaabe
SHA1fd9dcd2a776bf0261c799a76de9ace4156426155
SHA2567e38dbee4914c4ead74ad2fb5cefbee80b7fd355962eb014db8466671311f669
SHA5129dc34f0f641c1f76e0744525bb82b85604c2d8220242b134dcb6970b733bb5de039e0f7221d267de9289fe787bd542aa1d7d38e7a92af9f9fc2be4495e93a353