Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
63730132f0c54220d69b3ed5a47b7393_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63730132f0c54220d69b3ed5a47b7393_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63730132f0c54220d69b3ed5a47b7393_JaffaCakes118.html
-
Size
36KB
-
MD5
63730132f0c54220d69b3ed5a47b7393
-
SHA1
e639a73b86ed50bd2cc8ea21a24f2087e66b405e
-
SHA256
bc2cd27744d95f4f7797c1d71d71c1baa0dce960402dd2c150760c0b6f1d82a8
-
SHA512
fedba3c5244543f5b5236582545b2295719c0ce6202cdf3f09e0086b6b5b29fb3102b8b682fd5734b0a7e99110d056a7110538b740fc39eb6f6430dbe01693fd
-
SSDEEP
768:zwx/MDTHV988hARGZPXRE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRc0:Q/DbJxNVuu0Sx/c8PK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 1940 msedge.exe 1940 msedge.exe 2692 identity_helper.exe 2692 identity_helper.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 64 1940 msedge.exe 84 PID 1940 wrote to memory of 64 1940 msedge.exe 84 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 3204 1940 msedge.exe 86 PID 1940 wrote to memory of 4672 1940 msedge.exe 87 PID 1940 wrote to memory of 4672 1940 msedge.exe 87 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88 PID 1940 wrote to memory of 2256 1940 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63730132f0c54220d69b3ed5a47b7393_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba57446f8,0x7ffba5744708,0x7ffba57447182⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9022652567409274518,11522420755916718102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
613B
MD5642dc0b5f4c4f7983e7f4042117e1c42
SHA1fccb4f50b3ca6593568f127ba2e6e79d24ab6119
SHA256af39eaae1b588b11cab5f7c9292fe0571cdf843a7bd56397b92b63215b532785
SHA512b180b9b6d9f09462352d5d6c00e6aace39bb786c2f7bcf1290621049d0d53c774b31cdd299c0c71d1f919fd7891b268d6a2691055ab0a1949039d8deab9a3f64
-
Filesize
5KB
MD5f5e06eb11e2427b98eb41e8493e27597
SHA1f60c053046e8823c49c27bd3863d6eecd8ee65b6
SHA256c04ceba5716cadbe4761b38ccc90156c99c00a6110db1e9ea0e60f7ece72e58f
SHA5128fe6a066055527327d83f113dedd62e9cd2a38f14fcbd254c543bf545c045fa6323f29d917ef76d15628654342f05e81162718f6f464ad9f75c10702ff8d9c94
-
Filesize
6KB
MD5f2d230cd40ebcbe9c95d85c64b77cbd7
SHA10024fe7cc5296038c99319e46defe74b8465787d
SHA25680507d3d5544733d11f7f1f9280f3ed6f378692a1462ef13a273ced68aec74bf
SHA51235f8332851d9792843dec04c09b81516c736a1bebe1f28f7b793f0da420b2459f228bfdd708c232a1f1ee7002eed552856b904ad0fd73363e128186d709471c6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5642c737a4484ced302b0eb0762936eb4
SHA1a6cbf419e43074b29c6843a099391aa21c49d078
SHA256ab4fd73ca975e6b86ebda86ea3a6475fce82dd496871b24aed6dd7ffe10c5ee0
SHA51291944d982a8512c8f06d57077daee776397f144b403e9e328286f03ceb4641c55d078b99326c924eae4a14b45c5bb3802edc44da0d92b7c2570ef54a305e1d46