Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
63f5409534a524ac89f77a7df87f3551_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63f5409534a524ac89f77a7df87f3551_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63f5409534a524ac89f77a7df87f3551_JaffaCakes118.html
-
Size
131KB
-
MD5
63f5409534a524ac89f77a7df87f3551
-
SHA1
7ab9d2d5dd325208b38200b84a9fe327154d849a
-
SHA256
ce36eb2127bcf4e9ae2cbb6b08f9bc2504a84fc0694d83ce05eed2ce4abc663a
-
SHA512
12b9f6b85ea5bf3ccb85c5c8a05af2e5f55b777f6fd4b270751b72d507e04ea76af9e2e4a738896900ea266f295bb1539b95c9cc91e450663361e88290f60cbe
-
SSDEEP
3072:Sd6RjBO5a/xFA3+vMs5tW/0Ep69kXaavZgRLS79uQp4lnrF5:SdM/xFA3+vMs5tW/0Ep69kXaavZgRLSK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1964 msedge.exe 1964 msedge.exe 1472 msedge.exe 1472 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1472 wrote to memory of 744 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 744 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 4032 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 1964 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 1964 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe PID 1472 wrote to memory of 2448 1472 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63f5409534a524ac89f77a7df87f3551_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f56546f8,0x7ff8f5654708,0x7ff8f56547182⤵PID:744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9512190606599863182,14346601027898172500,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9512190606599863182,14346601027898172500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9512190606599863182,14346601027898172500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9512190606599863182,14346601027898172500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1400 /prefetch:12⤵PID:3548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9512190606599863182,14346601027898172500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9512190606599863182,14346601027898172500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9512190606599863182,14346601027898172500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9512190606599863182,14346601027898172500,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD58519a22bb82327a6febd29170a74e302
SHA1ab2c56efb4ea679b89398bfcc8cbb2974278a9e9
SHA2568e4d346aabcfa2c848a321c2e450e1d54c130e423aff8b6e282ebcf78e57fca9
SHA5128700a37f121eec838a3b965609425a11e3ccd44ec47589e66f3d3866845c0a72229d233056253c75dcb3a7b02177aca7132176dcad6dbd2b4ad5fa45ca815168
-
Filesize
2KB
MD52bc14d7f34dcfadbf2eafc18d2256345
SHA1b818712dc53429d0635abc832c8adb9ff959abe6
SHA256b9bcc48c22e2ecd0f9edbb54751c0847181e54d68872911cb80659ee3b69e528
SHA512df10dabe306fe002ff7da313c7a7fd71300d13d329b00e0fc46472dc596acddb85179eae9b0837f133922a64c660675c4b13d982dbb7559ff97364c01c18cee6
-
Filesize
2KB
MD5aaa77205fa08eb361769e62a1881abc4
SHA1befa3d04da2c3fc9aef848269062cf3fba90f014
SHA256a1c36f6262ebf81ce9349f58287c70786d57f06adf41314752de01a66b396306
SHA512793895ac024472cc7ef4ea555d21ca83622a92b012560ea2c50234e396be50a4ccd0f102ec273d128437553f1d3562e6933b8d908eaec482170a715f5a362aa6
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD578319700245e288a362999a707c2aead
SHA1d0b3442ff4a3e38764b75c0129f08b50194d162b
SHA2567be68be591e4def035090ae0e5dcf649c07131791dfecd579fb8bf0ec29a56ec
SHA5125cb5a7bc0e285f09df81cc12ec5e4225fdd20c9a298a13b50eb223e8d595116d87cc94c525e365faf524ea24acce7868215d1dc999c1f06f388ee3eb591e1c79
-
Filesize
6KB
MD55cfd92cbb9cb28bf83f6ee152193e935
SHA171922211dbc44d1209e8c1fff8f8be7434b784da
SHA25624df8d4ba2ce7979c6efafc8257475a8d060663b75e8e76d8185bdc33b08bb70
SHA512da14756680fd25c15379c17b68281be25ea0c0e5bdc074aa5765844e97f4b7982483bc89dce7e4721bd4b8d3b9aa4a6ea6ac192ea4c3324c8574c9e384ab7907
-
Filesize
11KB
MD51bbe8875599a4c30ea8486923f71dfd0
SHA15b12cd3623453b3724e1486e51d58a294faf575a
SHA256429933b404c6932040fff0b42c0e950d1b461744f29ced185ddf33c65fbcf24f
SHA512ea4cd11f38f8ec691c6d8df1e47b493cd007db8869d7256293999d09e4e71fd5dcc55e2fd34b363e28596e436e6418b162292ff2147c4d8b8ae094c59c88ba3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e