Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
63e93e34d521dde4fbba6326e4f64cea_JaffaCakes118.html
Resource
win7-20231129-en
General
-
Target
63e93e34d521dde4fbba6326e4f64cea_JaffaCakes118.html
-
Size
9KB
-
MD5
63e93e34d521dde4fbba6326e4f64cea
-
SHA1
ab0adc7c5e3d54864bfa652335d9f3f5e30bd911
-
SHA256
0601111db221a77221fcde0ac3cba25636ee429d43eb8bf716651c40c45580c8
-
SHA512
18fb086c825d34ca017bdca7f889802e2c45e0dda0623eb6818d62c815894668a754fb9cdb29cc2d3d76f29000404fb0584a58e726e4e138cb77ecaa63fe8cb7
-
SSDEEP
192:eFPNoFe4/fYVZOR4eiYQAl7clUbT1lOCRT7aH0peTL8TBIhPq:KtGf7R4RtA5ceb2sl82ug
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1376 msedge.exe 1376 msedge.exe 4436 msedge.exe 4436 msedge.exe 4800 identity_helper.exe 4800 identity_helper.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4436 wrote to memory of 3968 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 3968 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1108 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1376 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 1376 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe PID 4436 wrote to memory of 2352 4436 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63e93e34d521dde4fbba6326e4f64cea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7d46f8,0x7ffd6b7d4708,0x7ffd6b7d47182⤵PID:3968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2352
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2624
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:2068
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1624
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:1248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,90777301451938867,7903495204801477426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
189B
MD5efd079652ad21c50d69ad30ccf61a40d
SHA1000bc74057bb6ab42d2a160349e1597edb211bc2
SHA256045646bc1a87f1ce57c87ba8a6ed5332e36f71e667ac712be1df2fef80385f8f
SHA51235f643af8bb12bb445e3e6ce7577376dc69010ddf8d7e76752d703cb50f091bdeb9947b9718baa6e9e286d69df19a794522e446f29d58dc26dfea571045f51ab
-
Filesize
5KB
MD5ed7f429c850387387acd61cebee09d7f
SHA1fdead24c4f458ec0a653c55cfbb9f322bd331bf1
SHA256d14ed834b8075cbe92d72c132565db3416f02b28c44c6acd1af7da824ecd2a8f
SHA512fddf68e2dc6539e270462d1dec6fea0b022c9ebc8f7a548f2d71d4a7e9f33a2eeb24b2eaaf18957b808b9c59959984898e0e94e0fe546562c48625ba80650223
-
Filesize
6KB
MD5a51a4b74c33c0d138e9c4d208e943738
SHA1f1d0d530d5be4fe36536e41456db92d188e21101
SHA256235f461c2171d0b37a3a788c37a8b8b5669c2395a6421062638f0c4769b38663
SHA512f2721a00742a3dcaa8f8af3d5726eea52df2eb59bad1c5d55a24e75d64a0ee7ec58f16988fcb9011d00509c9f4aebfd0cc6bc9e9aeea0b5c818bff29f9089baf
-
Filesize
6KB
MD502dedc5a2120a61d1829d85626d28f25
SHA1973e385a0f449971f32d10413812ff27408749d3
SHA256b48cf1225bfafd68883713dade79c7744a3950b345751953b407746c47ed1005
SHA5123213117f77b5b10e123d23bc09b12fec12f81841e8011eef525557f73d1f3a0d9843a7efa611da54ab3b0589f9c6e3e84dafd3567fd7722b736e680546ec6ceb
-
Filesize
204B
MD5a33ef77e0dd7046bdf16361e4c696610
SHA173586bbdc99901589324488686e2c7a62df19c68
SHA256f61a236e06f2034521b12eb0e5e602402c0f50fe6af4c11f743d9b3bcf79f25d
SHA5122dd19f758eef74cbb51f4d941096363c53728207ab37b3f191f1ae9b897791fffe9933dbd267dcc7e55b4b230690c9a2a06fe483a3ffa4e84f8da8a84663601c
-
Filesize
204B
MD5cb366880285934f9525c2a7fc6269dc8
SHA12a8d25b14c1b02225b2c8fd13d6e5d57cc7603c1
SHA2561a5793fceb32eb270a5300808441f27997d3d662e77c0eab0d9abf1087a52336
SHA512ebc96863100cb39538648feee27db832de5270211d32b7f60400d4a72bc301e19a5e666d2b327b855c9e983b9312c4a2a0251682ff733a19b2ca50ef741fb571
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59526bab803b3373521b509bd3ef0ad7c
SHA11b969831cc9a127a668ea05cc9acc228a694ebbf
SHA2562ca899d46797eab6a2a6109ad1d42039f45ccca5203ea7a10d378ee1619e62a9
SHA512a2bce9eb7e2c2bc89e1dc4292753a64284c6b69d3eda96d3141ebde9800471e6051014d212d4ee470cfd6c26c99921b3323336c2a44c3a84b10119e2fef8b592
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e