Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
63aefa976c3da3fb2f3d4bc7b4230574_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63aefa976c3da3fb2f3d4bc7b4230574_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63aefa976c3da3fb2f3d4bc7b4230574_JaffaCakes118.html
-
Size
12KB
-
MD5
63aefa976c3da3fb2f3d4bc7b4230574
-
SHA1
9b76fdc6e3823322234e1c92d4b113abc70bb51c
-
SHA256
9cf18bc56eab1e21b97d3de580615a7553b3caff4698f77b0283ee148322f499
-
SHA512
128518fc5479d24bbcf055bd58fd46e01ca06660713496f749fbd7740619ce2486300268565ddc1738dc169684fad90c27ab6d48af5085b50242fa4ca25b2f76
-
SSDEEP
192:gRaV+K5lJqpq/UNlHzyE/GR49G2KBj0FSg1bHfCdofRNQNF1kokJYERPwhVNCACN:gR4VkE/UNlTxuKyBj0FSg1buMDn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3500 msedge.exe 3500 msedge.exe 264 msedge.exe 264 msedge.exe 4936 identity_helper.exe 4936 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 264 wrote to memory of 208 264 msedge.exe msedge.exe PID 264 wrote to memory of 208 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 5080 264 msedge.exe msedge.exe PID 264 wrote to memory of 3500 264 msedge.exe msedge.exe PID 264 wrote to memory of 3500 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe PID 264 wrote to memory of 3564 264 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63aefa976c3da3fb2f3d4bc7b4230574_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9aba546f8,0x7ff9aba54708,0x7ff9aba547182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,18381575842469977210,683533741202494978,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1324 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
453B
MD5decbafc122590a22610c99a090792047
SHA1c2f0cbb2cdda4777c7eb28bbaa7a9e7efbc5cdd6
SHA2565093d7751a93bdf2d7da18b29e69a8ad8363eb7d14c36c0945eeb6f634ed00f6
SHA512b0e90957f2cf7093decca7ea58e3f48ebdd21d65671b29b6a8308cbd545f3677ec862b0d461bbf192e1ff0b64a561f47cdd9217e1a4f2cd89dea4bb2fec95bda
-
Filesize
5KB
MD5a531efde28703528d6983c0b0aaa3ffd
SHA1b4e2e42469b211de4773f7b904789e3d44b852e0
SHA25694ead762fe24f211de6ada1705d1b498a3c19900cda05adb3329e3d5fc0c9ce1
SHA512438fc707a4b4162663eec2ec5d68d751bee607a4f171e1bfd02a60345412fe744c98a9c4a868ce14d321ce839d93c83ff0b35f0d1d5fc45f8dc09c3896c37c74
-
Filesize
6KB
MD58dcefccef767cfc07f2dcaa9f6cc0d05
SHA1983969ec8bcd9fe347c78e0469d25644097bf90b
SHA2568c76ba3b7a1f6f4898c1b16f291bb276e079930b08431801a11284e7eaf87f1b
SHA512f818d76f9b1f33e79c5041f8f0938f28d9e4789f6ea601363303c407fe1145a496e3567fe67ed3e60d9af4e12be66d8c49d14f7c4127c43ecaf390afb519a3d4
-
Filesize
368B
MD5fa6a53dd290704e435ca9d6f3265b49b
SHA12a5c201351dd1f2689595e2fd40551d2502f542d
SHA2561154214555bd62c4178c6eaa3057e2d44e0a56bd42b8af3ca73bbb3c6e83a2e7
SHA512e93fafcbc640e5c688c0ce85ef51dee4572d9cc77592ebd8e6a42f94c1f9795a68bb740a8445eb70e4186bbfb11e22aaed2c8e3edb063c8d447cb77cf6ad0fdd
-
Filesize
202B
MD58daf482e86dfce14dabd06f83440eb61
SHA1e83e940398a77101132af5c8e642d38ea9fd9ddf
SHA256e5a3ce53ff536d7fdb5d017093518abb98630b87be99bb0e590ff4d888769cff
SHA5120ba84dd712d2b4096cf2cfd6d6620d4137df5a50910cf39946557341bfd7a57eda8e85ecb73668e3c4531ea479dc2bf884d3fe0844ef0a807c5ea01e06145f43
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ba30bf9f2abe186b41ede3681da20c98
SHA1924a038aef9ea9195391bdf23c05f70ec93a33c5
SHA256617178f99b03c85831e2e3668c5a525ee2d4425e6cac6058e14f999a89680094
SHA512e7510057fd41730052a82c5a6080b7918bac14083af6ce665098301389c6ae3c23a6e7062a065a14775e920dfc31b86ace3ab70c101675b52c412d5dc782408e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e