Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
ad7e35e605a1d03e830fb1683fb6159b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ad7e35e605a1d03e830fb1683fb6159b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ad7e35e605a1d03e830fb1683fb6159b_JaffaCakes118.html
-
Size
62KB
-
MD5
ad7e35e605a1d03e830fb1683fb6159b
-
SHA1
fa00c5f7af66ad47ebca812435a731c9c0324044
-
SHA256
f62bc85f47856a3a6e4a84db60b541aa97a1b265a99f965f6c3fe4a5b416e6a4
-
SHA512
6faafb8c3304cd356fec8b9abb5fdee904ddb4a16e7a10e71e1b7e6d0a87c809be9cee0f0e5f199d406b76190f9a1ffeaf1cd7f4bf7d0b676cf4a3bf71d78a55
-
SSDEEP
1536:ITYg0JjaGwZU0gxHd8i7ZLBgUyKsumY/qIv1RzSFNlcZ0UC57iNG84RZlY:LZLGUyKsumov1RzSFNlcZ0UC57iNG84K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 2168 msedge.exe 2168 msedge.exe 3460 identity_helper.exe 3460 identity_helper.exe 3460 identity_helper.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 4484 2168 msedge.exe 82 PID 2168 wrote to memory of 4484 2168 msedge.exe 82 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 1100 2168 msedge.exe 83 PID 2168 wrote to memory of 4876 2168 msedge.exe 84 PID 2168 wrote to memory of 4876 2168 msedge.exe 84 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85 PID 2168 wrote to memory of 4044 2168 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad7e35e605a1d03e830fb1683fb6159b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed0ef46f8,0x7ffed0ef4708,0x7ffed0ef47182⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6463118116983616747,17154667055887823030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
Filesize
6KB
MD52250730cd1984c60657163d891c24ae8
SHA1969b54fd8a5e3586fca9e990ab5dc07b7d5411ed
SHA256ef3151b0d6a831bddb8e339c42cb37dd36441ca88b4b80fcc63fb709f9ff8b81
SHA5129c5eb1fc582e2daa0f8c69f1e9a066b9ebf0d93a2f2ef48ed74436fc13f5287e5512c74ef7553a71dfd52546fa11d2a41c40990723d41fe22ea586c9b95475ec
-
Filesize
6KB
MD5909a6b0656b3fd53046e4fe2d951c941
SHA100b64d38202fafe560964159540ef2b09823b4f9
SHA25634e7cb2412732acf718fb5ef155cb51fa210be5135f5b4d3efcf7876fbbd2581
SHA5124dcee6c369e8bf86dd2db00d193e831505c6d364c9aea25afd0e4b8cb82451cb2d0db9a2c9b6f0e9db5b12d98517e0875e3a778a360aa3a621977db754a33169
-
Filesize
6KB
MD515ea25ef19e464eb660b483f4bba45e8
SHA15513ee4e2247d52870ed229c9e4e465bad1587e6
SHA256073d1389b05de0f91751b9384c3dca242ba93b9be1bdc4c72336ea1a631c8e8c
SHA51200a4457b109378a889097b1d2407e4f0362782f6d0e96e3008af40150b31e575aa47deca49cf9557ed216952ac761c71d11753c177facdb38927ecf800bc88aa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f9bec9cab15e61135ff3dcc5e436a83a
SHA1d52c3c79adef95256ad9395f75c768d3f92f744b
SHA25657e4e02a978f2a647a4094eb633c8b32c661cc2ccc66ddcaa082bc50ce304f37
SHA512bb83a07b44cf974a0bb38c869fb5ed667e43f4f5abfbd1ff68fd3ba0b9f0288f54e78e2411de562752f4a992a2052c59c13722be358504172754293c046c2099