Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
63f49ea191f1a704284fdd71ef3b24be_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
63f49ea191f1a704284fdd71ef3b24be_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63f49ea191f1a704284fdd71ef3b24be_JaffaCakes118.html
-
Size
114KB
-
MD5
63f49ea191f1a704284fdd71ef3b24be
-
SHA1
cbf9141b00eab5128b03bd2fb9e103b95e4982bf
-
SHA256
348c1f010fe32991a8df4dc7fa6f956eb9ecd1618f3707287aea1b5c4a00900e
-
SHA512
9c37c017b7f246b807dc516836603ceada2b19233dd682d28d8a6c4ab51be58531dcf347c81e6578419073701e7ecc62cdf42c52d5fb4e5308acfb493bd48b3e
-
SSDEEP
1536:YIefhrGQlgv4KetPes6mwe2vgcX7RrWLCQ8Smag4gYgThQpFZfWmMHTHvgPNIyXC:X2hVDPesYDij8CgThQpFLlFl4cps
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 2100 msedge.exe 2100 msedge.exe 1144 msedge.exe 1144 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1144 wrote to memory of 4808 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4808 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2616 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2100 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 2100 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe PID 1144 wrote to memory of 4384 1144 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63f49ea191f1a704284fdd71ef3b24be_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffaebb546f8,0x7ffaebb54708,0x7ffaebb547182⤵PID:4808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2796
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:736
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:1408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:3456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:2204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6497474137134307484,12924371853779449154,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5688b256385afbfbb1dcf12d016e957db
SHA18af1150221ded6b8a1f4d2c881192699b692be89
SHA2562d328bff3273a7f5b3c7f11be56743e5fec9f9c61480bbd9d8c3d1616193b960
SHA512a6c8985d471f9ea5c5aafa42948456fd37720f4543d223963dec4e1a005760c3fb57f2475bb09245a5ec6d999c44a859e778ce9da658157fcc202058be2d7735
-
Filesize
1KB
MD52f47d888238c764387cd2496e4366c06
SHA183cbd9e305350285459836eea15c9279ff70ae4a
SHA2566f711120d2eca5d9bdff9b8d42ceb23b0d515af0b72f7ddc9be9c58a50addef3
SHA512023e73940cfbd99d598de8b5b3601c9eafca5cca6b623e75412d997c9b02a44ab3a0fba34e9d44e288e878bdfd59ea2ccd4d2427a2f4843df3ed075f32bc4532
-
Filesize
1KB
MD5a07da5164ce42b6cfb3bcb26bed880cc
SHA1542684ce8aad94a62e1d922b352746b03f94c9eb
SHA2564f0f1f30e2938d2d33f85046b8ac85220c06f54ea71e0ceb46be629697324e64
SHA512b62ecca866f812de4ab50cb7d316c268d01cf3ac4f2d5124ff7eeab9a7732f7e9084f9b0ad5e8bfa0d7c7fcee754e6d2ef92d580306f39b035b8de8a1490e065
-
Filesize
5KB
MD5c0b42d02d84864263b8caa76481b04ff
SHA18b98bbb3a026d25fa493ed7bcbf298dda7e07ce2
SHA256978e9e6954599a723c14a733a8b054a48331f7c7e4ffbb5136f5e7b1829bf791
SHA51215998a36d30ecb58e798999d0135118efeb3c412729d03c87a77e9749a341d199ae0dce73e4ef74088f9cbec49c20e8d63b5d2de6229c4ea977966435c38aa26
-
Filesize
6KB
MD5f9cefaf58ee8c1cafdc04c747cb5cfc9
SHA1f67b0c39fab2cadf883deb84caff97a3f0b6f203
SHA2565f66e73737e15534261776fbc8ed776cc9b64493a73a6550e5950d62659ca524
SHA512f8949b5a6accc0dd5ac9c0e439b12f4c82add3e7a2d833287005ec8eb8e10a6c2bcb6db92967164111fa10706e295d273a42816b8ab3e242892f0dcd5c42c203
-
Filesize
203B
MD56f6989587b5f03da505a48cd72900c73
SHA15ab66b5d98a309b4e203e64fd3989b54ae32a81a
SHA25668bb1737fb8310257a67fc5cb733b5c173e0ebe26feae327e53a5537b1d178b9
SHA5128e0ab637ac5297e460507e75a9b9ff130c5dbf46a6c7a8cc2190e38424fa0f6e53da839557eb28755836cf4406dd4f09fe58fda4874403a7412a697bfce26414
-
Filesize
203B
MD51de27806f1b029cf27982f653f56ebb2
SHA1b800ed596c923fd4185705553c71fcb599f3305c
SHA2561b66ff9fe7c8699f9c3aa216e7455c8648b1e6046b5c57635dd571e2711ead87
SHA51228b9f2fdcc4d5cf27469937c9d2172843c27b12e19950c5123ef69afa8d0ddcb72f0675ba7a273a7a0683e7f07cee55dfbbef907f50cb75f5e043dad7ca42c7c
-
Filesize
11KB
MD5e3dbd6ae2502e69adb3fa0f1f315c4f3
SHA104be57843979f065fb7a7d6999652ed2e8a499e3
SHA256f6864427cfd75c40f67088dd75ae86cf6c7ba0eabb90a5a3c9c723bf22eb8003
SHA5127b1ac7a4b104c60cc747faebc81c022339a8dccd7831ec83adb079248fe32b2315776bf4a8f56775209cf74d4aa8fae4c2e1d9b2471d4b33e1a658a3533d3dd4
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e