Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 14:56
Static task
static1
Behavioral task
behavioral1
Sample
63b33447178294e33872ad2596801ee2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63b33447178294e33872ad2596801ee2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63b33447178294e33872ad2596801ee2_JaffaCakes118.html
-
Size
33KB
-
MD5
63b33447178294e33872ad2596801ee2
-
SHA1
f0cd188096ae0366811436f847fa8a363ea8bd7c
-
SHA256
2238bbeeebd3835198ba742ba3e88156ef3b86bd723be61e9210752b283342fe
-
SHA512
a8db702a0496a09070c0223e879b83cb4a620fc8211067237617b63f75f98e78ee3a061f29e29af440cfc160a32bf822b2fbbab9ded457eeaf313030b5c60eae
-
SSDEEP
768:fDfS9oIHTppst3D2NlPYWfddwvecxwTne5QMq5cFB/cf4xQlxr:fLS9oIHTppst3D2NlA2ddwvecxwTne5c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5020 msedge.exe 5020 msedge.exe 2856 msedge.exe 2856 msedge.exe 1196 identity_helper.exe 1196 identity_helper.exe 668 msedge.exe 668 msedge.exe 668 msedge.exe 668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2856 wrote to memory of 4724 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4724 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 4760 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 5020 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 5020 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe PID 2856 wrote to memory of 60 2856 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63b33447178294e33872ad2596801ee2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,3465118953703256826,2836232930910432735,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
189B
MD5d66b250cbb026f8f066e544e2884f036
SHA1fb2e611ac268a1ae94b6d55c4966836edf88b816
SHA256c7fadf4d7b376a3856bde5b4e8c0234fad99bd24088316bc79d999ed6b819f47
SHA51272a70eeb9381586a539ad6d2405b6f75b314476b0118a4814fbeedca7cca89b4d53a2318c155ad9201cc152cd90222cd27b9886a388d237b359675de04b6558e
-
Filesize
6KB
MD5ec1de62c8052522e478711d1f9ca0586
SHA1f20c3890f660a01ba5ca1b8d296002ef6d33d93a
SHA256a8263da5eed1c640e4e14674848e3205d59d51b9830d3007f0594d89b01275ba
SHA5127b0e5baf36a2f1bfd1f979695e4eb64a85878e69f7915c67358a0159397da3c8d002ba5fc30763fd1f5d86c9778d36d398113bfebad2e227695246186031b735
-
Filesize
5KB
MD5750d8518c68920a3a653d10bf22256b9
SHA1dcf7e6c2bc2945e211a92a10e944964d02e0c773
SHA256fa1339810b6c58d14849c1cfcaea715eae4d9800814d424c4fe881a99d159685
SHA5121ef1ea5c4122f33e67724df72e7512673694ed3183afde71479af5cb6ac361a97043a43c5000fa6f5d9db37ecf8d2d95f1caef82ed3863ed0a0e579af6c94b61
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5416f311b3357368338b8bc92b819e499
SHA12c51b3323f9f9c2ff043d893c651194d83d80c02
SHA256f916cc1a1b4f0255ab98c94a6561dded89f38b32bc15aaa49e57a312d3114618
SHA51252db8d09594eed5f99caf98c44f32b92abdef175cc66bb97db7fd621a0661735f33fab54faf0ec4910e6718fe2c4f9e25031085bf11dab00fc53230a1580dc65