Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
ae73640adb1841648d5b14922e3c2910_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ae73640adb1841648d5b14922e3c2910_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
ae73640adb1841648d5b14922e3c2910_JaffaCakes118.html
-
Size
35KB
-
MD5
ae73640adb1841648d5b14922e3c2910
-
SHA1
3e20d86873edc03d23de1eede26ad6f58a646a73
-
SHA256
995e78050eef98bab599e1ded74f857d95d7b57ff089a78d845abf6680a9e15b
-
SHA512
da751bafb5a6bf933fdef93f8641b2cf5024b6981b14bdc2e113855577ddad1a6c2495aa7c8d698f88e2b4d7f220dc49d75f987d97f840f3ac7d6e71c419661d
-
SSDEEP
768:zwx/MDTHIS88hARAZPXjE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOX6sggh6lLRN:Q/PbJxNVvu0Sx/P8WK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 2496 msedge.exe 2496 msedge.exe 1652 identity_helper.exe 1652 identity_helper.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1808 2496 msedge.exe 82 PID 2496 wrote to memory of 1808 2496 msedge.exe 82 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 83 PID 2496 wrote to memory of 1988 2496 msedge.exe 84 PID 2496 wrote to memory of 1988 2496 msedge.exe 84 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85 PID 2496 wrote to memory of 5104 2496 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ae73640adb1841648d5b14922e3c2910_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,7824413955850549353,17129483705958946500,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4420 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5dbc1fa9ffa6800914f9d6042cf669c0f
SHA1f286f2d236cf85f0960cdcc87a45dbd8817abccd
SHA25655d10074c79d5db01cd6dffb9bfc3db34fc3ce50f10d2dbfff6d3f5ef987e244
SHA512793b801256c915ee9c7c6b35f535aaee85dfc87688d09182a97470173f0b9544c5d572974ec7b231935f8c5d4255c66e0c9ee3352a9abf92a0aceb86578aa856
-
Filesize
6KB
MD50bb54e3df428e0ca39710d4c2c275c88
SHA184b57fa659718c1ed5a6b6be431ce2b4a11c2368
SHA256d77107de84703cc61c94c48141e7c52af9b35284b2bc60ab982394c4652b102d
SHA51234715b9d6e65f3d47540316db4e4184a8850638681d3390f94b0b6a753de7dbb4c36a1bb0a02169a1d4b3a03d7907b7780a89ac280f5a1806751cb5dfb29fe27
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD593334c8988ea115df8281b8dc557b24d
SHA1b5c1f2fe55290116ffa8d388dfea36fdc1980063
SHA256aefcf9513e7af688a06209bf8dcaa824ba60f9f205d9db6653d76ae7e26a62e3
SHA512d2726e230d5e100f3e518d4941568c30002eed9cfdbca7fd45a8707ee72839e9da94b280256f02e7f16b96ebe4bc313422f669d8a2660cd542fa34c481aa2d8f