Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
63903d657fed2d3d21a0e09cfc5f9148_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63903d657fed2d3d21a0e09cfc5f9148_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63903d657fed2d3d21a0e09cfc5f9148_JaffaCakes118.html
-
Size
23KB
-
MD5
63903d657fed2d3d21a0e09cfc5f9148
-
SHA1
cc7ee446ed6e3187539ac3e17bdb8c91b015d706
-
SHA256
52157cf478a7d09ede85868e404c88d3f027378cccfb9b5113f2fe6658869113
-
SHA512
04fd297a1fa298e359c5042698934937e632b18222fa7f9472acd3248cf3e625c6e01e524746c286f21cf252a636e9fd0bd94ff39a7caac28bf56122d460903e
-
SSDEEP
192:uw8a6Na2NmhNeb5nd5yGeidzMhjqJlynQjxn5Q/DCnQieHtNnVX8nQOkEntZECl6:wQ/zGvs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1920 msedge.exe 1920 msedge.exe 4564 msedge.exe 4564 msedge.exe 2548 identity_helper.exe 2548 identity_helper.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4564 wrote to memory of 920 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 920 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 4832 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 1920 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 1920 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe PID 4564 wrote to memory of 3724 4564 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63903d657fed2d3d21a0e09cfc5f9148_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae94e46f8,0x7ffae94e4708,0x7ffae94e47182⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,4980382987789223286,2047761960082173331,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5453a912af30cb96d332353d03c680b48
SHA18175377346d4025a4e35e1a4744b2773c6acea11
SHA256c81e666e51e0d28c1fe09556511f04afe4d8533ba6ccfb3b57ffd3a0569b5362
SHA51225a716f8e40508ca200c86342ae6179a9dfd488d7fb1894cb14a7b7a0205bc9b1da4a3c272995478f0b7975dd05cad2c7eab0b5dbe23dacefd3ac84c79cb8082
-
Filesize
6KB
MD5ea875a561fe96a0072aa281cf1ccd5d8
SHA16828010148abeb4e36eead8201c5d9c00881b038
SHA25615a5eabb2203422cb8900404046a9e70b4c9bdb5a49962a8d35d4784dc23dd60
SHA51247e683226d7098f6e331c7232f841ddb96d1594a4da40c867d9e86b65a21a292a51cad1634eda52d894e2ac67d48e96b93374a0b0a490f3582613e45f3657644
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50eaff178d052b5881bf3acb1e103d587
SHA1c26709ffea2b82cfe84ae5e310ffef3d7a045b6e
SHA256625af2133f60ae7bdcdb8bf509f77a426896ed030de67bc00eca29d42e42fed8
SHA512d8b732a0b785065ad6831e0b402b373778afd0bdec4abf340143c101ba4f8b6d9b726310d3268250657e46d5e60e9f9a12836abd389d894d3970baf2c8a97561
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e