Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
ad118ba1d41be6574f7a1feb3daa2964_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ad118ba1d41be6574f7a1feb3daa2964_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ad118ba1d41be6574f7a1feb3daa2964_JaffaCakes118.html
-
Size
10KB
-
MD5
ad118ba1d41be6574f7a1feb3daa2964
-
SHA1
dfe140e7a1f3641e337129d023ef4c59352c48c0
-
SHA256
6db162cd954f092dc93525ca038716b0f60088a4b6d68e1799b77e158dc3fb84
-
SHA512
8c2a4c4781082931b9a97c1e120168122740e6199d0e1a611a2a63276a79c1423491585079412b65cd9be8e4d9f6db2d2948cb1cc1af72844cd3bdc02da63129
-
SSDEEP
192:tPNvkEcfpPg7Ke7yPxrET2PeMPUJfNAVOp3iH7wg2DA+:9NvkEce7KxJET21PUfziHQ0+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 1356 msedge.exe 1356 msedge.exe 3812 identity_helper.exe 3812 identity_helper.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 3096 1356 msedge.exe 82 PID 1356 wrote to memory of 3096 1356 msedge.exe 82 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 3644 1356 msedge.exe 83 PID 1356 wrote to memory of 4504 1356 msedge.exe 84 PID 1356 wrote to memory of 4504 1356 msedge.exe 84 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85 PID 1356 wrote to memory of 528 1356 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad118ba1d41be6574f7a1feb3daa2964_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2500 /prefetch:82⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12893948633435412901,7184426499405711473,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5d6f59e4-06f0-446c-9817-61c0162da3ec.tmp
Filesize5KB
MD504a51efc86b3aba448177a6aaba7b02c
SHA1b1aeed322447f4525df9e6fb1bd2c94c04bf498f
SHA2568af63fe33c9c4f6b29601018a417a9131ae21a72e24b6849b2233652dd842ea8
SHA5128bf3b8b268dd33ecae8ad19e38134b4eef42db9da9f7fc6370b4823b91ecd145fd925fff31ab4323d736dcef6c9425479fa21e331aaaaa6f04117a0a42d5471c
-
Filesize
5KB
MD583a48dffd51cd899c00de09f46a653fa
SHA1afb2f52d0ac9e84afff8dd2f9ba9ffcf64deda54
SHA256f2021d34bb372e0af5458ee61f914655f5bb0c791d45f5f3a6871c8f7727c088
SHA512db6bd9a31171a6157d55139716e8fd3740d4088d108fcf46104b05a2c8dfabe2e1ed5ee09acddf5d3143d2a69822624b4cd7928c1d3c231667a0385abbd510e1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD57346f0ba02172e799ddf5e95053a4998
SHA102c64151e117c2eb442b6885ea1f81e8dd56168f
SHA256f30eb29663ff517a57fe138f552c1b78651f2d6bbce109c06abd64323b16466d
SHA5127b6d3d16c6ad66abcd01e0f37ab68f784810cf5a8063742f7858fa4bd96d10bed66dc6e541ed0d070531d700473c88f61a1f9f8e4429883788d876cc9d5dd6fd