Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
63d5fd7a16b5706b988bba30462ecc12_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
63d5fd7a16b5706b988bba30462ecc12_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63d5fd7a16b5706b988bba30462ecc12_JaffaCakes118.html
-
Size
51KB
-
MD5
63d5fd7a16b5706b988bba30462ecc12
-
SHA1
c3cf870e11cdfcd1c52725c99ed3d5445fa171ca
-
SHA256
0f8e1847f1e823bd2437d25d13d647d8cebb87899b6a227814f55dfba970aef9
-
SHA512
62484b6879b6ed233e57f5977aae4b7ffd145f0dc278f34264974d7243f4e19192df500a12b03bd82d3b92c311d95e77661076fb6a6ac1cd8c1225a8ed00fe5b
-
SSDEEP
1536:bXoF/exkytwJdwAwZwFwbwcW+ywGws6wVw/1wwx9ULEdV8mz7RA17o1ri1Rgd7On:7otexk/MwLuV8mnRu7o1ri1Rgd7OijRU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 5064 msedge.exe 5064 msedge.exe 2740 msedge.exe 2740 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe 732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 2740 msedge.exe 2740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2740 wrote to memory of 3200 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 3200 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 2388 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 5064 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 5064 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe PID 2740 wrote to memory of 1160 2740 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63d5fd7a16b5706b988bba30462ecc12_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe730346f8,0x7ffe73034708,0x7ffe730347182⤵PID:3200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,781226100688853312,2544412373339140606,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,781226100688853312,2544412373339140606,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,781226100688853312,2544412373339140606,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,781226100688853312,2544412373339140606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,781226100688853312,2544412373339140606,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,781226100688853312,2544412373339140606,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
324B
MD5484cc98369c7cf2134c2af626ebe413b
SHA11d50a5867336dae20d9cd255fb6cd693e74c19a2
SHA2562a3adbbf7700e5cbe5ec4a7f0760528e0668c8a74be041a86841a3e1d2c1ee93
SHA5121d33692055a38cd2239163dbb83389fe88e6e4516fe0f685beace8a5a3155dd323d210503784d34d59450e2cbe1dd2b8801b9c2e6c542953e29098af614c3d5b
-
Filesize
5KB
MD50ffdd8138101b9d8ff44994c904fce59
SHA1fd3ccab3338ad67b31a89da10eae60070f308ef0
SHA256e60579381807124e9bfe7e8e41c40b7b29aaa1f2b8084229794f7d45f4ca7045
SHA512aaf2e586347ed323f78e43e633729e49018a78f59762564ff7998c2401cb9a108af2243e18ded0001fcfe1149f1febadaa7d7d7297a42c493638505e04e13b05
-
Filesize
6KB
MD599ae213c531a0a203201ce4264a4e7fd
SHA1ab81e1578469d3b5bf4da51a1ff33e0d19e3d656
SHA2569efe44feffade0b14692b1bdd3ab93804304eac9081726484d18f5adfcac7dc4
SHA512705f9ad54908a60f47cf0027cbde4565a372000d4dfb681d92bf9f925fedfab5ae7b63d19b90710b199bc4bb9b439365b9e8130c9c88ba55cf5d88803aa6d2b9
-
Filesize
11KB
MD570e77651f9fff3c917002361389ce31a
SHA1921a1cb95bbb36cd2c73a57783d19e0a0fb1d3a5
SHA256467ff32a69d516e128f40b78e98fc18c913b23e4a540375e51348d80e1f06e3a
SHA512de33f10587d4f0a47da759298f9a16c8799ca856fb368a5830cf3be5db3ca9a0ae79b231a19deca8157a2e9bf967aa573eeef440b6258fdc54eaad6b3013926c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e