Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
63d479a00c1eda049723c81f1d31a26d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63d479a00c1eda049723c81f1d31a26d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63d479a00c1eda049723c81f1d31a26d_JaffaCakes118.html
-
Size
46KB
-
MD5
63d479a00c1eda049723c81f1d31a26d
-
SHA1
f502de08c927c80d5a8079fbbdb6db45b6bebe9d
-
SHA256
2c99bd1090f5b0a8d72076684f5d31bbffc39cd346c06b7890efc2f6333cc255
-
SHA512
5f04e5a7537c16556442be6b247bb1fd7fa9005cc4d200faa9a9c65f03c221cb157150494ac435e3a541cd97cd275dfcf9f9bd08614157f73fd3dd8ebe253cf0
-
SSDEEP
768:D6op8y9NeRUYCyt/8/o5Iq8b0z3333339GEM0jFqxx3oW1i0KMtS9V29Y5Uu:D6+8rKZytE/o5IRgNBcx3oz0KMtS9B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 1176 msedge.exe 1176 msedge.exe 4584 identity_helper.exe 4584 identity_helper.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4596 1176 msedge.exe 83 PID 1176 wrote to memory of 4596 1176 msedge.exe 83 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 888 1176 msedge.exe 84 PID 1176 wrote to memory of 4008 1176 msedge.exe 85 PID 1176 wrote to memory of 4008 1176 msedge.exe 85 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86 PID 1176 wrote to memory of 4708 1176 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63d479a00c1eda049723c81f1d31a26d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x10c,0x110,0x114,0x108,0x118,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1340 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6408732977003180875,3447840487680522860,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD52d1696e549dcfa6b390c63020aaa20fe
SHA1fecd90d9655c30fb386b6a75b650e5a890184c46
SHA256854699e01381e95ec0530e460ab5e55f5e7bd6e691bbede894c03ec4bbfd6d68
SHA512e56420fffb23dd06419fd7f998688cbb7c0e49ebf6f6c71fe44d1d3abd849cfa32dd84cfe34aa0aa45c0246885645d9915134e8388381e6a88fc2b45e04df6b9
-
Filesize
1KB
MD5103ffc57e2c384361481e012fc3811ae
SHA19deba825230f2049e99d5969b6f385154f8684c6
SHA256f35c352694619bc51e7baa1f32ce6138658b56812d17e1f2ac8f9c2a63cc0118
SHA512f332c587536cbb84338cd935903b141752160f94f068d1ab7055bed7f59779130da1d25467421465f0b082b13906d761e7e2cf4e3efb27cea4197cf92bdbad15
-
Filesize
6KB
MD5f00f142315a42e4b3b7263bd2e772a63
SHA1f4f65b9f385a452943e83cb63a0f11f55ea1034d
SHA256167778b2877845035ebcc0b228c4c947ddd8007e0970488ed7cee5cbe4b2b2b7
SHA512b64d129871f8695bc00044bf7f3ab1c91578945ff5ca0dd5f739e0e9ba5cf98059cf72b2fb0e157d477b1c04ad2772b5e4667a7578b8275cfbb583d55456983c
-
Filesize
5KB
MD5620b92eb727e2af2b0edf531b22da145
SHA1edabfc608d6efecea644a418745d8874567bf348
SHA256b34be61a8cb70d6dfd7386f18cf53c87b6a6a2527c58d9d63ee9380673f7ff5d
SHA512e716c23e40eb0186626bd1c8d2ba8943b9d7bb7dcde956a47d7d3ee8634ef8ac624913575f68396d1d95117a9eaeb3baaa313b175a62216ccc2d22034026f4be
-
Filesize
6KB
MD56314b64b2159a0b06817dde0073c42ab
SHA1d2f50926bd07aee61ff5eaf9fe99029442d3569d
SHA25620be45789d0ab42ffae313b317cfa28ee60c53d4503b15998e790b2fe98ffe74
SHA512d403875e7f528ec78fa8dd6d8441a28a7fda5cf51e932fd6f0107ab1e1ff16b84f35e18e16ad71ea3c5f80af6b754d1f880c4381cce51cbd7dcfb6f916f178fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51519f3dc7f2ddc8864201a7c03c985ab
SHA1a7edb6a4bcdfa82fbfd4082f7a2df567eb13cd60
SHA25670512b61e1e5cb9264f42e1518d7bf186b8a102243432b5bde6e3d5d56a09354
SHA51210055e09bce6313aee60adbcc6ad56184ea2e3baf0998584d072cb60489fe38380646e1920c6e79614be7c435a1b32dd84db64630f64e0070cbd40bc18dc51f5