Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
63b19b90c8a328eb77c717c3f600fed6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63b19b90c8a328eb77c717c3f600fed6_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
63b19b90c8a328eb77c717c3f600fed6_JaffaCakes118.html
-
Size
1KB
-
MD5
63b19b90c8a328eb77c717c3f600fed6
-
SHA1
3f69e57bf81373c8796b9c2fca8f303ebf2bd98c
-
SHA256
f3a60385a00e73667eb530c00d07bb360a990b3238b89c57fa67970ab0efd3c4
-
SHA512
90742c13f86e465ba85c20d57b36369a79468c222e64ed0849f11f43320736010952e23203862763a6468c6d367e2ba9c79e008ba0a8ab8ebb5abd0cfb7c54a6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 720 msedge.exe 720 msedge.exe 4844 msedge.exe 4844 msedge.exe 2560 identity_helper.exe 2560 identity_helper.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe 4844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 3140 4844 msedge.exe 83 PID 4844 wrote to memory of 3140 4844 msedge.exe 83 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 3636 4844 msedge.exe 86 PID 4844 wrote to memory of 720 4844 msedge.exe 87 PID 4844 wrote to memory of 720 4844 msedge.exe 87 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88 PID 4844 wrote to memory of 4980 4844 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63b19b90c8a328eb77c717c3f600fed6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b2b146f8,0x7ff9b2b14708,0x7ff9b2b147182⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10436495753449710303,12436540593866226953,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56d7af9bcfddcbd8643f01171ef61ad30
SHA1f22b0287b918c13d233a4895b6fe363f56fd52d5
SHA2562d90789800007945052b22fe3dd6f8851c73a8b6557737724b9263743c158b0c
SHA512058b78226a24833f8ffcbcc105c58dcd3effeb342844453bf26312fa483892162b909d3db392b695198536defe2698811dadb8af3ed801b550a03f934d20d967
-
Filesize
5KB
MD5369f05df215a00a9715e3d4bfff803a8
SHA1b942b2e7fb96fc9ecf33243501f88b968e3361a4
SHA256c8307f197c8aa9e59a2c0d4135faebe9daa300d2c958548ed94f0db034e6cf08
SHA512e94f1449ba6ed3d9c53d52855220d624e5018b378456b83488719616eb80a7daefbfc0262aacf851e196ead1d1f0eee8553677f7f85f411c604adee131e2f848
-
Filesize
6KB
MD56f18117a1ff4a8596db288c19677c7df
SHA1d3752dcf7fc24f0e1206f6f831ac6ce1b8ccddf6
SHA256bc2d7c6ac579fa3364d7ef4dff0fca25e9879642bb7eb58de8e4a0ce915314df
SHA512fb7cdc085844c1a11914f2fa47530ae16ffa17c796c82c3d9b8ad757cb07889134f8075214d0c7857a6d7ecdec34194159391d387d1f89d928523fab9ba976af
-
Filesize
6KB
MD52fa81a23b2a9b312827b13cddeb62a44
SHA12d53ef9566acc31478dd522345d5bef775bd4272
SHA256fda6bec36daee80f8c19643f26c9d006ec569be04f7f956350e01c9c966a6366
SHA51230eaa051e70f034fc080f41ada4ba6973c0074e2eb392a3faa4cbb166825142273c548b9468ab31b6c8ab078d02a046677ce647cdb7034c2e76c24ae3ab5baf2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f78f56d34c1cd2340eea3e20fdbc3ff4
SHA1cb1c6763b8a24a3a90002a48186bd30cab5303fb
SHA256020cf8d13013546cb312086a9fe1443592dbfda7d300665df5609025bed6df46
SHA512c7b7fadd9871b64b5237bcdbcff69cdbe554ebf379ad8ad5d0b3826f8f1ebc19ab1d46eaf20cc9809a5c394004db3808b808d30ce3b8b73a3b2b2cfeb954313c