Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
63d3fbeea27cca0f8bbdcbb097b41380_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63d3fbeea27cca0f8bbdcbb097b41380_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63d3fbeea27cca0f8bbdcbb097b41380_JaffaCakes118.html
-
Size
52KB
-
MD5
63d3fbeea27cca0f8bbdcbb097b41380
-
SHA1
c1f97f7d7593f32f4e3f39d7376efcf925f29ade
-
SHA256
c529c48d92c2c69ecdb0896611e188494828fa6e814f9e46d189654d44336cce
-
SHA512
b5d989fa7cd8034220f5b6b5a0a16facbc5c9d47f2163a57456bdf20d4a0fd7f7a63f95b4a9e8a98e1256d01ae077ef0752f8a9e21141b555a293b23485464db
-
SSDEEP
1536:cyKqUaIrbQi/hjmh6FfIrDZaMkvww26rGrQ:cyKXx/hM6FKD02EF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4956 msedge.exe 4956 msedge.exe 3004 msedge.exe 3004 msedge.exe 5044 identity_helper.exe 5044 identity_helper.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3004 wrote to memory of 3644 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 3644 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1732 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 4956 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 4956 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe PID 3004 wrote to memory of 1168 3004 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63d3fbeea27cca0f8bbdcbb097b41380_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa84ef46f8,0x7ffa84ef4708,0x7ffa84ef47182⤵PID:3644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:12⤵PID:2000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4076
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1344
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:3176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1368
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,6743114079351205003,4284169181506714460,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
588B
MD51f6beb3b024fc2a1e34b0e2c3d05a318
SHA198f722e24d4c38d4582484a89bf246a1c031781f
SHA256761bd8822fe43883ff72422dcc86a94da65addf13c5a64316768a2db67ca2d41
SHA512466e2eefca0011a33f0b0f2971b2c15c962686867f6cd9f4b0965fbaf833faf591d4349b31ddcb7dcf59350c0112cfa7f11f53f516215f8f79c21c149d0fce2e
-
Filesize
6KB
MD545d69002801eed137699e02841d0775e
SHA17ed720bb31accfbfaf8bc37dc8be7745540f0f37
SHA2568f729eabb8ddcaf9a10891117ee77fd8318ca3e0238286cff63486c55b54dd39
SHA512fb79c10ce1d6c4a99e05a759c3d59434451bccb534466aee193dd5786190625d94d7c6592b9e28b284f8acf624c8fe350ac8756bb5daa9f4f46e1bdf37133ddb
-
Filesize
5KB
MD5a771f8f04a9923723938296bfa5244f5
SHA1f5201fb8ae4079dcb4bbf8085ea9e4abc196a4bf
SHA256c5cf1bff4f57fb59e3592e1e290e5e46e57d9d72e30ca97099343dd5ee3dfe82
SHA512a609983439fb6aaed498f3c492b3af510e3ee7dba9c25b5dbcdde223064afa10d8f1b5929d494129db6967a190d9712d5ae163abed0efac2a5d5e618077018a3
-
Filesize
6KB
MD5c82e246dc44ded03d56f1155115cd5a0
SHA136a49544867d3b7bdf89a6ebadf4c1510d67257b
SHA2562bc0cf12eba5ea705a838848934c20957fd9ae78e098f689e024c54c3cea014a
SHA512cbbb438b1458a0455b16b3059a294538d5620285e5c4fbd9178c55a6435458987f0e518ad7742334dc39904d3dbe88d7021291dc823873b11cdaa8ccffbf3daa
-
Filesize
706B
MD5994814b2d9aae13b318a49ab86ee1524
SHA1ca184866ee0b4969e5ed9f07a9c8ef91e3bb5255
SHA2569afca883ff5c749ed8120a50924d23004ee8d1038e4d81e7b325f73379f481e1
SHA512f8413381fd9de846917185204327a9a4b2a273178346b44a82c96fb3bcd1e02c58de38fc344644f742379d2969ee06d640dd55edba0337bdc56a156fcb95fad1
-
Filesize
706B
MD5f2b5c7d63070d6f244747eaa71c6d013
SHA1063a9baedca25ea6d3dfa6966cbd4bcdbfa7b64b
SHA2562845737d22e0ba4bf5ca8d2f71fc0accced28cd3320de9ae6943862e7afe2b8e
SHA5123622e61378f50ef18913847be1e90c71950fbc8819dea57dbd1dd3ef4b4e132fb181fc4895fc20a72bf5b024aa1fdf4e0d530e3027575f6c85d94a44c32d574c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5ad2c56466a51ae29a1417b5d056fefbf
SHA12eb50ab69602501e5f3b128155dffb776a0f35e6
SHA256a333423d72144875b2328874c2072649097459868971d50565de82fa1dce51aa
SHA51272723c0da06480e2ffa1a4e0e3c2a52a324138228f37cd0b932700b6d85864f11f1429e740e6e84b984ae68fdec209b6fcf123d3a3e065bb64a92e0bbc6f5d47
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e