Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
ad0e0c2e55222c041fd93b06e4ba45ed_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad0e0c2e55222c041fd93b06e4ba45ed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ad0e0c2e55222c041fd93b06e4ba45ed_JaffaCakes118.html
-
Size
127KB
-
MD5
ad0e0c2e55222c041fd93b06e4ba45ed
-
SHA1
81e88a0922c8568bed1b9d3010111b326762832b
-
SHA256
9d55882e1ed3902df86605d4bb4c8376e67281cc30c31410e2820c2c8df18527
-
SHA512
dd2495b0e120d1ab83153066cd51f701d4664c3df0ea23d7376b3eb7b7a4da9ffdd71386fc8d7f8c0ece6eb3e410666c0bcbb12e2aac4e85219b275fc7e41e55
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcJ5OHAOKgLLd96Uo7cZsX3Hhp:sT//Lno7J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4556 msedge.exe 4556 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2920 4556 msedge.exe 84 PID 4556 wrote to memory of 2920 4556 msedge.exe 84 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4732 4556 msedge.exe 85 PID 4556 wrote to memory of 4212 4556 msedge.exe 86 PID 4556 wrote to memory of 4212 4556 msedge.exe 86 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87 PID 4556 wrote to memory of 1728 4556 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad0e0c2e55222c041fd93b06e4ba45ed_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f57d46f8,0x7ff9f57d4708,0x7ff9f57d47182⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7586475974985690771,9632761043889668452,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7586475974985690771,9632761043889668452,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7586475974985690771,9632761043889668452,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7586475974985690771,9632761043889668452,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7586475974985690771,9632761043889668452,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7586475974985690771,9632761043889668452,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD58c13d05f85254bc97ff5c90119220796
SHA14d3fc9cb4f028f95fe551eeb3397745e6ec8894b
SHA256f51c25ddd5691eb928c3a499476a8f8e442c0f663815dd974d2fabb9a47afe01
SHA512e0fe7c19492ebd6457463d176e10aea4580c35a0339a70ce02cfaa37a88850d5fb06eb69bdaa6f63c70de6bcd7e3405189d9142f4363168f837c0a2a9e98bd58
-
Filesize
6KB
MD529e42b77383a1783c7f9591ea84a7378
SHA18643183869d056d00398a0b17e06509bdf6020b5
SHA256b3a6df668398ce7c24fb1feb5cb45bdbd4c9bc72c83edff284688918ef11534a
SHA512058b4540f7495265648a4418b825731afbff23692c047923918269045931e971366cab2a125d5e739eaf40898d412034f7ad3028b77aafdbd69c0b2e36428053
-
Filesize
10KB
MD546b1a332e2bd5f94148ceff270fe4cf4
SHA12413dcd7d79b3844f2e5c71b7b33527183136ab2
SHA256df9d03c8aa5d2866c887fc543b4acb4899b4915712bee20d442f4cc3a77a55c6
SHA5123357525e48cc2649e6339895bc2541b71ee32c283699250806cfe87acd9c875f54942a375084bc261494559481b70ce1d083511b3771f1377ff5f987057610eb