Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
ad67e0b174ab7097c1978d735d6f6df2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad67e0b174ab7097c1978d735d6f6df2_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ad67e0b174ab7097c1978d735d6f6df2_JaffaCakes118.html
-
Size
26KB
-
MD5
ad67e0b174ab7097c1978d735d6f6df2
-
SHA1
013e984e9e0545d362f0b7bcf339085cbbffa4b8
-
SHA256
141bfc5668c11f2688a271f1a5f6de47282612a61516c08b3149a2c0097b3b5b
-
SHA512
202ea77e4fe0bb9d0eeca77c7a95d2325bf27edca84cafa04b7742feac2e45d96020994b6e438b0376a1843acd669f3bbb8d1d4fa94d9e4f935374fec060fbfa
-
SSDEEP
768:JSe52fGzk+nOuPGY8xBiftsx8f9N9DYDUnJYSooI26:JSe52fGzk+nOuPGY8xBifts4QDcK
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 40 pastebin.com 43 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 840 msedge.exe 840 msedge.exe 2740 msedge.exe 2740 msedge.exe 1416 identity_helper.exe 1416 identity_helper.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1536 2740 msedge.exe 82 PID 2740 wrote to memory of 1536 2740 msedge.exe 82 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 4504 2740 msedge.exe 83 PID 2740 wrote to memory of 840 2740 msedge.exe 84 PID 2740 wrote to memory of 840 2740 msedge.exe 84 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85 PID 2740 wrote to memory of 4872 2740 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad67e0b174ab7097c1978d735d6f6df2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb027646f8,0x7ffb02764708,0x7ffb027647182⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,12499812957388817208,3601704705822430751,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
180B
MD5781f712234169a3d5217d656b97944d8
SHA1d5a92c7938ee15cba8e6533ec411891af74458f1
SHA256654d03bdf36ae7dde6005259a0e4a916ef40a33d8f0b90c2b7127fdff88a9338
SHA5125b8169ac078a32bfbb58b2c444717832cf094d244cee9a93cffc9e068612554d515bd5cd2f919f3e447c6fea6df12e8d5aa5e385684aa2a7cbaf1c6eae042e2d
-
Filesize
6KB
MD50e4d3a5614c9f600438859a4a12b578d
SHA18374323baea1cee6374218c2c3c27301df7e25e4
SHA2569d47ae51980dccd6762cc825f86e43a83535ee0dc737f6ad4b62d7eb590690d6
SHA512e6a4d22ce362389e02127ee7109e8137dc896b729893fc174025a4e2186a2e2cc41634f913899f884749ec86bf98bf1f0a52786232af97f49b527f333f3b8a02
-
Filesize
6KB
MD51a850c0702109ae645bf689e7e560bcf
SHA1cffc2a34faf59ae0d294438530314b79301a34ba
SHA256ebda1d6fb66c9fe3d522ae18cb0eed927d1401d244163673261b34103fa366b1
SHA512460bd7bc5afe07693d291552ba9a03b6c27b09e7227a44850d3489a04871f95ad7f6bde7ad5f671e8d3f79fb640f0ea3a4c2ef3565685971e4cb726c985f9f82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5257b26645fa12d0ae294b05dae83013d
SHA1fd039afc4313181cb2426a1d3f3d96c507d00b37
SHA256a62be1a495b71239fa77db43293d2c0a795168b06d1f5467e5571a4366ff57b5
SHA5125f94ecf179cf36eea1fb1ea32ccc0118dea25db4e0952dba2573643c50d5a872cd6ffcc8f1bb8c1aa90a1ffabf82d08e7c539d7838c0f529ee6e8330ff1df550