Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
b63dd263b55e08ac61cb6be2fd56f887_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b63dd263b55e08ac61cb6be2fd56f887_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b63dd263b55e08ac61cb6be2fd56f887_JaffaCakes118.html
-
Size
236KB
-
MD5
b63dd263b55e08ac61cb6be2fd56f887
-
SHA1
7bec53287749f4cd7e3332677412a7a511bf01d6
-
SHA256
ea90e084b14aec6f4b08a6878fb45a7612bc8b28d924c921774e7668f50d36f9
-
SHA512
de776f2eb7ac5c2867d279e4c689c036f00cb23e848ba1b8244d1bcc0de166472f4208ec7b34d0c37ecc681c37df80110382cb7af29bcc2c106a4d6c12d279d7
-
SSDEEP
6144:2PFf+AwlxVg7L59FnQ3FnkzUFzQ/F/5R//:sFf+AwlxVg7LTFSF/FGFz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 1396 msedge.exe 1396 msedge.exe 888 identity_helper.exe 888 identity_helper.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 316 1396 msedge.exe 82 PID 1396 wrote to memory of 316 1396 msedge.exe 82 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 3004 1396 msedge.exe 83 PID 1396 wrote to memory of 4284 1396 msedge.exe 84 PID 1396 wrote to memory of 4284 1396 msedge.exe 84 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85 PID 1396 wrote to memory of 2844 1396 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b63dd263b55e08ac61cb6be2fd56f887_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d18a46f8,0x7ff8d18a4708,0x7ff8d18a47182⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1796 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,428768261753763845,10637294606229950627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
882B
MD5ae67576afac11f483def03244330da41
SHA152e6880090051313a4a9f73b40ba72d078b48d46
SHA256cefe0d4a88c184adad2308ac770e63015a7ca9f4440ed72aa89ed75b01732233
SHA5120a973d8a1fbe350fe8bc239897f6ac2200af19fa6d3791acd8bda831dc950c2438c21856500f7ad40d36ffe3dd64f81d5914b8f80793a114624e78dcec2e2748
-
Filesize
6KB
MD5e5f1a5d1052609367561965e7617ccae
SHA168e63ff19e46aa86fb24e53179d7f99a03b67c77
SHA2564f573b26bd21fa9c79df5715e380b88b361a2174dabbe4486ff616bd7b3b6793
SHA512236dd49bb86bef3e8edce215c8b12887c5991cb477dfffb9bf222fe8c62d3567ca49c58da1c5ec3a5b15e32584f59943aa27aebd4847db9e69bb695337aa1605
-
Filesize
6KB
MD509a42ff3caba18a27ac6c07314d67f73
SHA1bf0dd16347739af639b71aa08834508173636804
SHA2564100d35124144287a80d17ac44fd2d744faab6df7bfffca405749d6d375bd679
SHA512384b20cab61785025c688de07c86508442b552333738f5d25295c87fc4def8fe998f8c808c446b272c6ee6d5e187891283623f4e7a001f9a21e5aa7551e8f170
-
Filesize
6KB
MD55fa1749e5d14a936d0c50c8573eaa26d
SHA13638e0217e65519d9106783d3c944f582a8d3dc4
SHA256f919f6ecebacf0334b5119467e646c627cf999a1509dd7c91602ca2593973e1f
SHA512f1532021ed721abe4ceab31a45719d22ee3bbb8f72edb40e09a7c4d52798492665628c3e06c50330c8aab5f86096b6ad14b022e4a6cd897bd702ae68657ae7d1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ae2714a1678f8faa2be368bd003cb6d9
SHA1cc7ea7e8ce60d200a2270112f1f6c6ddb7428c9d
SHA25621049fcd0dc5e71409b4a78d5beac3525e154ebd6cf24712823243ed61ce3387
SHA512e59d216aad617680be046964447d47db836e7e623578e1b6f472cab1e142e4a10cf05766919443d60cc541d97993f9952e24792dfef33a81c8aeb9b6509bd9a8