Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
171c681989ecbfbb42fcc67a337fafc1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
171c681989ecbfbb42fcc67a337fafc1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
171c681989ecbfbb42fcc67a337fafc1_JaffaCakes118.html
-
Size
260KB
-
MD5
171c681989ecbfbb42fcc67a337fafc1
-
SHA1
4c943ac48e82cf3c7b6eb93e2dfec8d7060a589d
-
SHA256
863a13a41267bdfbd6fcdddad633a26ea4c1f15e9338e41c7bd3e88cb43a687a
-
SHA512
2361e33e482c95bce952e9fa71909fb352b4896a499080e849fa7f08d244900abe59d895ef5551cdf61a6b80bd1ffc9e22f04477ea002ba04d97789e13869d04
-
SSDEEP
3072:qxDNvG8emAGXmNJUzqbi2DswBuoX7BrbNE+FcpWRsM8r7nseKv:MfXmNJF7VNE+FcIqMv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4412 msedge.exe 4412 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 436 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 436 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 116 4412 msedge.exe 83 PID 4412 wrote to memory of 116 4412 msedge.exe 83 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 3188 4412 msedge.exe 84 PID 4412 wrote to memory of 4904 4412 msedge.exe 85 PID 4412 wrote to memory of 4904 4412 msedge.exe 85 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86 PID 4412 wrote to memory of 1276 4412 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\171c681989ecbfbb42fcc67a337fafc1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a5b546f8,0x7ff8a5b54708,0x7ff8a5b547182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1824 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,10939606664813924730,3781933785862293789,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3012
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x52c 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5704016e22976b16c3b8985e4cc9ecc34
SHA1a60d33b24c2133877a23066b26e1acc274eb47fc
SHA256f346ad254f898d231321188e8c75a8c834ee62b99ca3467f233b8fb9d1718ed3
SHA512b7e30be108077d5fd44b1478f0a95ad5a9bd91abb213fc086b22c7c51cbdc9c670b79245b48ca90cc91255326e98b2ac4e26341ad306cb6b4b3cc14ddf39e4e3
-
Filesize
2KB
MD55c5da2fb697952681de91dfa4575564b
SHA1ae65de68710b05726524e21ac543a0867c6ca567
SHA256b7960c0bfb69a49b140fb1110a04c3c05e79dfa8f63c999358ea50326543c3d1
SHA512020bf7143b89e84b3acf40adaa2be40bb3dfbf5b0ede1615879dd1e8ec33bb4354ad1036778cdf9da5365a7a6fd74aa77425e01bb69fd1dc8898ddfca6954f14
-
Filesize
2KB
MD59f444bcc337cc674f8c3ac7782967d99
SHA1cc92adab518997ece7a811b341fbb6a1e27ed897
SHA2569f1efb2393f8d9b6eaa9c5f35a1629e407a5c23bcc0e64fbf60cf01a8a338b58
SHA512a8a713dea1b0597e5ce3a2b7b723c7597b384600ae8d81ac2077c6adf6dea34101483f6d02b03dca97640183fe772643c50c3ade2f80c64f56591ab20e74b549
-
Filesize
6KB
MD5b6ea7ecd5cf52f1ebf64d5c810694062
SHA166827c2738821250b01dd6387e8303ce101c84ed
SHA256838dd4fc35625ac36aeba507f8f3f29db18612900aba8498a5d3f4beacdac56a
SHA512af9439ccadcf4f373c028aaa745536c3e31957fd17109375d384af066cff8194d650196a14fcc120ccc606d387c0b043bfaa19326a3befa422098c7374bcf35c
-
Filesize
5KB
MD50b199b665eab35502d4bd8450b3dbfe6
SHA18248a6ab0055adbd0cc785d560d3a09c74a1456d
SHA256f901558075d1a0210d5a7174d15a6919ba3473cc35d4e3c416e63b24cc59d5bf
SHA512e483d532bd346df08f546cadbf976dd9f8d3c659692cff4d4a997709fe6e037ca091139f766e54d2a4301e34f024b221a425d1bfe6a8d841d8613d0e60022b83
-
Filesize
371B
MD552ac0ff0fa0e6442ffeef6479700fd20
SHA142c0f3cffe8016cb090a051c33fe287cb781fafa
SHA256f132336e2d17bca75128c0b74ab4b730c94beec856773f1d158b08ce8d7348a3
SHA51289111010a4a78a134a1991e01628a0b6edf533e5eccb583ac04847b28e78a866f03fcdd57b0e1b036feb1f4847d8797d63f0ed11fc474161ae186a21c31bc6eb
-
Filesize
204B
MD55530ab5c50590bc80b044c003cccb6bc
SHA18131e3071f236129804073a19a42655870de5002
SHA2569e38d00d84c7571a2340a20ae20f639e1fe27ef1c0f1ee1276e1292a8af444b5
SHA512dbd869b6e506be077b94adecce950b05c298767fea8d9e35df6ea12f69f1be877b04fda6cb0bae486b37b94a38b571999a82c41c51755507b677f984e5344934
-
Filesize
11KB
MD582e4ae72314e1598b229ffef8bd0d186
SHA1741812ab6edc09b4187d3f5dc3f58758ceca271b
SHA2568dbf359f3e8c625cac851a8abe4f0e71aecf62601f2109c135aac460fc1417ea
SHA512099859a03024d9f7e24ee141f484927f7ad6136a8a58b6a2798f494a15030523339898d09556cc0ecd0a67009062db38de9bed6c50ae889c1937c6efeb82b748