Overview
overview
10Static
static
3JaffaCakes...23.exe
windows7-x64
3JaffaCakes...23.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3UKHook40.dll
windows7-x64
3UKHook40.dll
windows10-2004-x64
3UniKey.exe
windows7-x64
3UniKey.exe
windows10-2004-x64
3ukfaq.htm
windows7-x64
3ukfaq.htm
windows10-2004-x64
3ukmanual.htm
windows7-x64
3ukmanual.htm
windows10-2004-x64
3uninst.exe
windows7-x64
3uninst.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 18:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ae2e1cbf8477077d682a9e7882e80023.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ae2e1cbf8477077d682a9e7882e80023.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
UKHook40.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
UKHook40.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
UniKey.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
UniKey.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
ukfaq.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ukfaq.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ukmanual.htm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ukmanual.htm
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20250129-en
General
-
Target
ukmanual.htm
-
Size
55KB
-
MD5
b9f20348346972a5d2e113486bfbf414
-
SHA1
7299cadb4d9867ff85e0d8e1546d806da1e94872
-
SHA256
d9bb0d8692420454d0c3c33fd7a8e424a897f79c401b2445f46ed7e14b5c82b5
-
SHA512
3c9b32b6cb265edb90015ee51bd273d549ac1fe35392897746da016236c2acaac614b4bec9be0e1bbb29e9fa2618b613b27f9731e71e50d81d08dfa1a03258d5
-
SSDEEP
768:d39Lj+Ctu5LvK2hDjmSdjhxNaTzf9H+vyDzzJUWxkYlWjDQMqDnMxTv:d9DtqLHXtYH+mDlqD6Iz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1916 msedge.exe 1916 msedge.exe 3548 msedge.exe 3548 msedge.exe 1420 identity_helper.exe 1420 identity_helper.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3548 wrote to memory of 4320 3548 msedge.exe 84 PID 3548 wrote to memory of 4320 3548 msedge.exe 84 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 4660 3548 msedge.exe 85 PID 3548 wrote to memory of 1916 3548 msedge.exe 86 PID 3548 wrote to memory of 1916 3548 msedge.exe 86 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87 PID 3548 wrote to memory of 3604 3548 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ukmanual.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2d4546f8,0x7ffe2d454708,0x7ffe2d4547182⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4276278620115197770,1125777648651926813,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b9013b8bea41aa2c8fa7f4763168069e
SHA1349be86bde65cc0c3a15b2b21b6eaf2db452e92d
SHA2566245436fe808740cde15c227fcda465a37a52f17f3642a71f0abbc466ce5b466
SHA512d23bc18adb6acf9eb36fea85becb7b1a004bed034ef443acc3d442d1364f2ffa17f57e8eb6eeb1702dc459c5c16763b4e72249e6a326c9c36800d3f395fdd326
-
Filesize
152B
MD5908f9c2c703e0a6f81afb07a882b3e30
SHA153ed94a3145691e806e7dd8c160f5b459a2d16ef
SHA2564436bec398522c5119d3a7b9c41356048c19d9c476246c76d7a4c1ee28160b52
SHA5127af7116a91c8e3dfc23db8a78d7aff9a8df8e3b67df7f4ee66f9380dba4d1e66d980afaefc5dc2d9034ab5c0b7c6934400feb32645373f3ff4f8816414ae6ff4
-
Filesize
5KB
MD58ef8000b8f2a087160fb3ea6a3dee3eb
SHA1180f37116c5213106c68986c05a8af1e8508afd3
SHA256327f2083d831f9486ddda223a34e2bbf64e5b4ea4659196e56a7d9a52d87927a
SHA5121300fc621804e7196d34eacc683bda795de67b9ad703702ba547dac14f0ddc5f5ebda9dbf34fc9fe8a71b603e393572b8e50e3dbf063ee912ad057b2a7fad055
-
Filesize
6KB
MD5ee849a7534dfb4cca80c940fd529a8eb
SHA1a181867aa3c6ac8254a5261d74ee1cf24344fa8a
SHA2560d05fb5fb9b47cfe7ff227be29577e8c2c28d0c4c542199c92bf94a0651dac9f
SHA5125f23508776474b47e987910dc4d54086480eefa186428ce002748385baaac762d014e402cc7e5dd5800a79b41e7ba5ed11da95fc9282ff3551afd85f76ded546
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD564540060ab600f1e79c261d3d394a311
SHA167bdd1ec61065ff3a4afe643d60502873a8488d9
SHA25606b18bc69e65df043465cbf17ee0075f4d1031479b91ba656f27093a108f8cfa
SHA512adcdfac041d8d7100cad00a62281b716b717a4c94c1fa7c45a5ee3b91e5c8978e1628d2a67189f6514f17146c062c8b56f418ffc94ca195c91686a9a4aa48031