Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
63a7a464a47653efb65a6ea745cf8d68_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63a7a464a47653efb65a6ea745cf8d68_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63a7a464a47653efb65a6ea745cf8d68_JaffaCakes118.html
-
Size
15KB
-
MD5
63a7a464a47653efb65a6ea745cf8d68
-
SHA1
d895e5c7b808ec214bef515d3de6f66630d4ed96
-
SHA256
13b62409f1c6635d5fba89b6f57fda2c6f4f3ef09bd1c2b93f903243ff5b8306
-
SHA512
b3393e6663ee399b0e4a64b0862b3f15dca67cb6140e4bcb18f4870275cb4103b26a29c13a3573c735599ac4c5b578c421b0447d56e14713dd5433107fdbcb68
-
SSDEEP
192:rtZKtLUMdnue3kczF2SzzQZWk0lbtuvE/mK+PhNTpyzCR:icYpm1nl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 320 msedge.exe 320 msedge.exe 4856 msedge.exe 4856 msedge.exe 4572 identity_helper.exe 4572 identity_helper.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4856 wrote to memory of 2540 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2540 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 1196 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 320 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 320 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe PID 4856 wrote to memory of 2420 4856 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63a7a464a47653efb65a6ea745cf8d68_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:2540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:1196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1484
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:3040
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,7600120291581088439,13285621729959991775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\41adc185-8e64-48e5-b2f9-7450fc7b07e8.tmp
Filesize5KB
MD592bf5f70239b447969de4a29f5bb6a68
SHA1712c58579ca52ce2df469e6c56e194673ef42933
SHA2569aacbbe004f541af48dcfa57b9fe9257f8049e7a346719baa1d2c5790407fdac
SHA5128613b40c71936cb2d6f5219fd2b7bf117996ca9c687d1e221893e2df49f75af9de626b4219f78534fe696370b0b302c94a0e9870b6679b162562be33cabc86d9
-
Filesize
397B
MD5430b253721f551751172e9bff47a4ba4
SHA1dccaff15e8c565a97296d27b18fd184a53148eec
SHA2567fea2575f5a39d6df7d04e988665e5a53407578b371947d52adbc89a604f87b2
SHA51263874e78ed66fa897f44c6819d7076c40b2c945207965215a2a0a44f296072b9c19b3cc2b9c597e41b0dc80443463af5b6aff215fecdf7208456a4ce7b7757a8
-
Filesize
6KB
MD504065b3604e17963b38fcca069533da5
SHA19f2444cac28f7bc01c12bbeda859ec4fcb0dddaa
SHA2561b22bf170dfd303bb4896576ad4dc075fdc7906e02876391463188f232bbb855
SHA512c8393d005006b4f26b10bc7de57066affb6aa10f8fcc871abe075d0bdffcc77acbd7f2b1ec9e869632d1bb1364e6881c8cf2a30f30cf2cce30d55f3bb13702b0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5476160d6fcff2377bf9d778e4cfaa3de
SHA1573b073e51174dc0ade79d360296ee5051faaab7
SHA25636ba90cb76938b7a6f10862250b0c31e808ebdf92696de98b443a250badd8f3a
SHA512786cc9a01950769286fe37f58362ebd70951cd9a168e5b0a0492aad0903fce95eb4cb33fcd252368efc8d21a13e529e36f615f04a099268399f2530a8fd91bf4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e