Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
63f5ac9a58e7903f0409daaeb2e2bc3c_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
63f5ac9a58e7903f0409daaeb2e2bc3c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
63f5ac9a58e7903f0409daaeb2e2bc3c_JaffaCakes118.html
-
Size
217KB
-
MD5
63f5ac9a58e7903f0409daaeb2e2bc3c
-
SHA1
a45debaeed0f6b3851ec1cc4ccad1093c52f92bb
-
SHA256
adb695a8338e425553ac3450047c785d704aed8ea08c8575da1563fa57bc3e7b
-
SHA512
5d4ef26dda401974c046e17168555ca2c2ddc544b7d43e8a7f5445f9d1791471d7ff903a41ddbf5f520f6fb6368e594fe7db5a60d4ae21df41d691eecfe197fd
-
SSDEEP
3072:SYOFBMWNTeyfkMY+BES09JXAnyrZalI+YQ:SYOf7R7sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 1292 msedge.exe 1292 msedge.exe 1476 msedge.exe 1476 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 1476 msedge.exe 1476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1476 wrote to memory of 2028 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 2028 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 4228 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 1292 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 1292 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe PID 1476 wrote to memory of 712 1476 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63f5ac9a58e7903f0409daaeb2e2bc3c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb533746f8,0x7ffb53374708,0x7ffb533747182⤵PID:2028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16942267073116923307,13373943838936559515,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16942267073116923307,13373943838936559515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16942267073116923307,13373943838936559515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16942267073116923307,13373943838936559515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4680
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16942267073116923307,13373943838936559515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16942267073116923307,13373943838936559515,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD50b64b91e161d81cc8d355bdfa3149bbe
SHA143161a9e2162a9d3ccfade0ed18c5479ea621091
SHA256b15bb182bb71039334830196cc9e4e692e73cc08389017a76f8df9a4c17ae7ee
SHA512ed19d15894dde981682b4b0f68af0bac57b9514838f7bbc13172c0710dd488e7977da7d4b2a3414d7ff135c989646c3cf8b5387dbaf5430080b21d8f6ab6feba
-
Filesize
5KB
MD51022010a97c63d16543001359037ac8c
SHA11db3cb1b6c24fd1442cc735c3961584f1b7206ed
SHA2567724ab23588c09b4ba2448edf6bd1c59da7e096532dde95997abf24144968a56
SHA512158f01e0b5c13ba702bff01fa6027e06c2d0a89dbac91102fbf8b120e71856273b8574a6a7925bdcc73656b0a5ff80fe3f71fa28db035e34f7954dacfef91348
-
Filesize
11KB
MD57ef89857394964e3b5295e9219bd806b
SHA117e0db1353d6393664cdbb2c3fc225e5a85aa55f
SHA2565b51d97e7688fd3d9704b66f1094b63bc370f130de07995db570ece2df25aaaa
SHA512514f2a0142ac0853e35835ea3c14c6a39dfc8c711258d860ee236bc31c79be6f55ad7e561653067430c67f828a08fac25c8b984fb4f260623f3d8ab5d1aa7898
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e