Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
63b9c2c60940e0f21eb36a17461d8bb5_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63b9c2c60940e0f21eb36a17461d8bb5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63b9c2c60940e0f21eb36a17461d8bb5_JaffaCakes118.html
-
Size
120KB
-
MD5
63b9c2c60940e0f21eb36a17461d8bb5
-
SHA1
7854c8a38cfeb9bbb7ba3e7343594ada5dc6e746
-
SHA256
55956624809a42bed5b2b33350f7d38662cdd6d02647cd852d7f0538ac796789
-
SHA512
3583547264cefd21cead67299603257a23626f9a6ce89fe204db6792d04d46e5fe036c13deb7c6db72d7ffd4db93b697f7e8921571082d506403cdc16e5d8965
-
SSDEEP
1536:SNkyoTLMZutmzHhHAH5HDHgHcH1m2FjcwSCF4mPk1Hc1gq/:SNkyoTLMZuMzBgZjA8Vm2hl1g4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 1884 msedge.exe 1884 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1908 1884 msedge.exe 82 PID 1884 wrote to memory of 1908 1884 msedge.exe 82 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 2728 1884 msedge.exe 83 PID 1884 wrote to memory of 4744 1884 msedge.exe 84 PID 1884 wrote to memory of 4744 1884 msedge.exe 84 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85 PID 1884 wrote to memory of 3132 1884 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63b9c2c60940e0f21eb36a17461d8bb5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb55f646f8,0x7ffb55f64708,0x7ffb55f647182⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,8578758824276320,17181683283079445180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,8578758824276320,17181683283079445180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,8578758824276320,17181683283079445180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2468 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,8578758824276320,17181683283079445180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,8578758824276320,17181683283079445180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,8578758824276320,17181683283079445180,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5e3730399b7dfc319abbd760f8ce74d0f
SHA12823b9a51cf8d343edf479a0e12525e565896d3a
SHA256d9fc016edf0a5531f574a32ab10cf3cdefa9993656dca93e535a46a29a741996
SHA51261b30b4bb6d84973776c2c1221eb7e01fdaf5e224a6adfa76b8df6278e1cc8fa7009636ba7af397e5034073f7853f116002fb63adb404b135b83adde3dc7b205
-
Filesize
6KB
MD5e36fc3a90d77223fec303c96d36d536d
SHA1bda800b57adda4cf4123147a0d33880911c2972d
SHA25685c207ba71e470fe3991c7383fba8e5f7534980f8f011ce593cca51c612491f8
SHA5129fe6eed7315dab9183f4d56a749c9637c1dc4007a60384a5111c5b6303c47d98d39f49b167677c90239c853e77f86a795855d085658ea140430f00625cc8cfdc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d91758ba-2d4b-47b7-a715-6526dc392672.tmp
Filesize6KB
MD50b10be39180784315433dbca78e7a2e3
SHA16823039115de10e3d0936a65c55b61dee1a5463a
SHA2566cfb8a816c4653c3e3e8ad8664e2e98a36a7b39ad8e7bd3cbad71301f60d21e7
SHA5125b569d23dcc235b02050201f1b17dc7882d9bef315210a0b93ba91ac3ce31c1f5141403b0532d433e11903b78c98196251950fa26a9d2c630a166f774bbf3f5a
-
Filesize
11KB
MD5be5f150ffae3ab1e8df41080f1037372
SHA1e9db358eeff99f96dd8d3cce14e5f34892083506
SHA2566310b101c8f9f894ed6ce15e4b68096e61a6213ab855823d413a91d90446d68f
SHA512c5f051bb1e008f30a1b641f195cc45afde784c4e88a4b456564dd04c7c687c8258e3dfcd671e6e2381df565c5a98e211a7eea7db2b5e0a0cf9ba0e6883546927