Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
63e82e94d17cdc986fca778500557cff_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63e82e94d17cdc986fca778500557cff_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63e82e94d17cdc986fca778500557cff_JaffaCakes118.html
-
Size
202KB
-
MD5
63e82e94d17cdc986fca778500557cff
-
SHA1
c8ab69c5dfce7772e920db9f7a8644f6367814de
-
SHA256
43a121c0812ac487dd4fcc78bd59879cb6271d791351ed9e83fc4d2e011b864e
-
SHA512
f040edbde80b6299b3a789d27aa26dc0e83b482ca15ffe26097700e3314ce4714bdbf40cee63cbe743fc2ac32b898bcc56155719699af8f5e38c6ca19d470855
-
SSDEEP
6144:/Htk9ieQuSUlkWSS9bq63YagQ0kZ5QECF:/tk9ieQjDWSS9bq63YagQ0kZ5QECF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3908 msedge.exe 3908 msedge.exe 4084 msedge.exe 4084 msedge.exe 1668 identity_helper.exe 1668 identity_helper.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe 4084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4084 wrote to memory of 3028 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3028 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 2864 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3908 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3908 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe PID 4084 wrote to memory of 3532 4084 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63e82e94d17cdc986fca778500557cff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffefd5946f8,0x7ffefd594708,0x7ffefd5947182⤵PID:3028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:22⤵PID:2864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:3532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:1924
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:1216
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:4464
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2320,8181370226838110484,4434614887744772475,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
481B
MD5fc6671a5efc560827a3ec22a840067f0
SHA1880e176b736e719e6545ff64e312ae28864a77f6
SHA256adb906362ab03991af27aa23090a7028a2f0b884f3b286bacc7322978918e352
SHA512626876efa56b00453613155cbd0caf4c8e15a6b99aacd80ae7846325344333f110df401223cab64c164b1b5e877525d0a5d9c3f3fcdf3bfda3ee10b09450c47f
-
Filesize
6KB
MD52d07b9a91b411780861faa3f80afa7c3
SHA124bcdb521e9d848834fbf7c0ab3151331fd27788
SHA2564d6813743a90fb8a610f598f96f4b310db233e13f4220dc7078689f0506e8b78
SHA51258b2fb87908c899c6eff07302734e42e9863b4093fffbfde99251396a1affefce54f29a5f56307619dea5b17c87bc966901d0ea37fa0ecf0b4973f54d2b37aba
-
Filesize
5KB
MD59ddbd1a2f8cb3d14d871c9b8da1ac111
SHA18a4eb6f11017112126477e68aa226a2f29ef5ecd
SHA256abe81254590f957d5fd3e2609395ab7636260fa0b3403d60a0b6eb8d46088aa8
SHA5125452e8ed4ccc605c2a6b59f193841be96ece9bf82518646b65fe29dccd03b7e6219399d40435ac4571cd7b073f5da89535292e5edba760eba6168d3d4302f3bc
-
Filesize
6KB
MD52b6998307ee5b9c225352d603f839588
SHA1372c315ab42037999625b2f47a1669e8b96f29f6
SHA256f7eb7976a7a73d2d64e4f93d6e47881cdfb58da21a18d22de75644246431a019
SHA512a2da215194b25cde3063eea2dffc162fdb8d4eeef3c32ad46e26b5b184dbb0e4f824b64484a6e8f7c651480024a7950e65357e086fc64145e29bfe9253a98e33
-
Filesize
1KB
MD5a5c08bda1b0436e4dee2bdbc731452a8
SHA1e2d0099b71f364765af2127748b263d41ae1b61c
SHA256ea79837dbed3b93de00d57a74e6e8670c903271a6df8e4708e6ba959e13f00a2
SHA512f2fab32a99819af18b3f5325ba097b7964a9932ef9fa42e6632adea5e0fd377b74146798c00beeea2a818b738944dd84b35f12a9c459d3292d681e9345d318f2
-
Filesize
1KB
MD53a7e1a910ad8ed4eaf795a53f79f6fdf
SHA144a04209b85abca6c10b039867c25b8fac8daf17
SHA256a9bb7bf2c2c22d51b8844fcd61ad61c8a74d12b9a5b02cc40606941ba62ad628
SHA51201c1ef09ad61dbdd9f1393db5a9af8cfababca33047e8260d0d8f8e648e2ccc575883974d5fa62ad7a4307ae6af777bd695b4a9d7bbec4f5330e308b31cc7b40
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5282653e2eb2cdaa90f95d4ff226c6d86
SHA19ae4c7ed90ebfa79863a923c753ae180c407ca91
SHA2568995e8cb6a54f118efe229366202b6cc242f8829a85ea4e085a678a7b24659e2
SHA512e2258de5a8448032dda59e9fec79fca96fe52f0e1bd13ad7cadeb498cea6e9a2e41a46bd022cd403cf5323bed969ef7954ccf2b9b0bd36813495146a3eb1ec77
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e