Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
63231f0d79ab3f9986029adb1235503c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
63231f0d79ab3f9986029adb1235503c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
63231f0d79ab3f9986029adb1235503c_JaffaCakes118.html
-
Size
14KB
-
MD5
63231f0d79ab3f9986029adb1235503c
-
SHA1
0e89aacc237107af599de18efb985e7cc36c42df
-
SHA256
b069a95f2f40060e4c8957972156917f58c8ca40afe33c2ac0861102065fa5f0
-
SHA512
30bb75e53bf9098e474f1c7ba24013f7ae1d53485377ad4343dd64c97641281a9fa8d64968e53b66c5186abc66f9c2f9ba13d95c4fc23cda7baeca4db468eff0
-
SSDEEP
192:1Fm8QBVxnZP6418CEgCHI8Fmci1abYMKAF2eMpsp3ykPSFSpP8d4pJw:1QFDpP11Co8F0YbYMfjMqtPMSpVA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 2196 msedge.exe 2196 msedge.exe 764 identity_helper.exe 764 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 5084 2196 msedge.exe 85 PID 2196 wrote to memory of 5084 2196 msedge.exe 85 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 2652 2196 msedge.exe 86 PID 2196 wrote to memory of 1420 2196 msedge.exe 87 PID 2196 wrote to memory of 1420 2196 msedge.exe 87 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88 PID 2196 wrote to memory of 2004 2196 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63231f0d79ab3f9986029adb1235503c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffbcf3246f8,0x7ffbcf324708,0x7ffbcf3247182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2556 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16899046049141723384,11340034727856376991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:1968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD515cfd5917e42470ee4e0ab131b078209
SHA1804b74d122c538d35ddbd6b533b436629d35a7f4
SHA25613c7e522486eaa08f21016c973d5a44e78f5f0561cbffd2f24680d1ebac5e123
SHA51217ada390bfd00db2a82d2c1f955c554cca2919001e4a9674cfbce5eb47e5bf8ef0ef8ec0335d4312a07d3ed58f1e0eeff3dc9761539b6c7e60239d70427e3ba9
-
Filesize
644B
MD5a58cc5217c8f717c430a14c34ebd53cc
SHA13830e50d3cd3750dca1d5808f77eaaeed740960e
SHA256361931cf97365718d711df000f4490d55f61421a7a95d1fe47ef1a6f06c3960a
SHA5129316d68a9e699b65504e710756afe4a20143802102ae4745d7761982e9f5db5834ceac30cc6df35817639aed30acd4576f1f196f7890c2e142a7477fa7369a91
-
Filesize
5KB
MD56f3d62e8339b5c6953a8360c075b7b4d
SHA1ebd8a8c97ef9f0e3183762fa6fa0931397f95d66
SHA256adf8751940239ad984430b8e3a721510a58b0f011bfc10130dc3794345f6f8fd
SHA5125c2dc0fa8b1f78e41857e92aff4fbd8bb4569eb24daca919273059a7dfb8a5526107fb7563779737b372edac6c75aab8c09147acf0b26b0574998ebeeab59c6c
-
Filesize
6KB
MD5ab15da33b6024dcfa2c67c9e50a06edb
SHA119ed717511695c76c0ac8971981c90bebe2a2105
SHA256710e92c97c5ae516d069818b6f6bc465a203547ed71475cc418c3581478daa46
SHA512d6701927f16791bf5d11638d71d4ce10213a42b639c97a736027574a03f5d037ac44c06aedeca75ab065ce79a301e3b5c09d66fe3692024ae10ea6c3f4a6dfdf
-
Filesize
6KB
MD5d7390a16f2e4589b997c46ad419277cc
SHA18b1e5dd03258ec1d4cb3b5b099ac38f798a8e8e5
SHA2566fab2b63dfce50efbf3fffc2b8e606ea2c630fcdba456bb88642ef5163462b56
SHA5121c18ba5408fd0b4d14fc1d19e168b39e937a59ce69137d095d1fb5152319ab2b8a02ad5e405b9513a34284a33a69548cc1c997b377e0107d3ff06af324930778
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD576b496b0d9d541685e2aeb8830beeb43
SHA1a186343ff57e3bf5b5a350d5d1c1b56806edae18
SHA2562cd7b5849808298b66abad1d5c144079ccd3438d72a9f260edbb1a9711c21565
SHA5122ce20b5b35de6413b6db417838ac0011055aa984e8206bb75ed66a9e6805c6b714e7b4714502b42cce4f11105da1fe22d7a464e8b5ee261e21807975341d7b32
-
Filesize
12KB
MD5a8a7f73101d95d056439174e4c839e5a
SHA140c1ebfa030253a86ca41e4863e34a8ded78e199
SHA256b25636e7dee80a0b653a297e49acaee7eb41d165d2f40ffef6180643ca843258
SHA512c4c2235465d6603efd00db969dc2e85ef6e59e78102f69dfef86d0ebbfa81f7e2d4f77d3b009c76a38f18a9aae29373c842f1a37ed12c63462c0e408ff3f0c40