Analysis
-
max time kernel
144s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
17437a264afe74078e5bade939e1ff16_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17437a264afe74078e5bade939e1ff16_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17437a264afe74078e5bade939e1ff16_JaffaCakes118.html
-
Size
47KB
-
MD5
17437a264afe74078e5bade939e1ff16
-
SHA1
a565a2c4b91486c74c14449e6e25f030127316f8
-
SHA256
fb552cb0b3ab94144e28bacf34dfa43a99c6fb10a89b4b03a270a69767c07c82
-
SHA512
44d9e466c6171a3c90cda1f34e50574910e90894534a94e07948a3cf277573d3a2882fd083e6d2e799795d450cf2d056615b2e9e192aaa405ee26cb89b06f430
-
SSDEEP
768:UJfLaABhElZZQ4lTZny9RCxBhgEX0QNf5Ao7uSPyE+GtIAU+pzW3uT+o+:ExKbZQ4lTZy93BR+pzW+T+o+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 1520 msedge.exe 1520 msedge.exe 1000 identity_helper.exe 1000 identity_helper.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe 1604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1020 1520 msedge.exe 84 PID 1520 wrote to memory of 1020 1520 msedge.exe 84 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2988 1520 msedge.exe 85 PID 1520 wrote to memory of 2432 1520 msedge.exe 86 PID 1520 wrote to memory of 2432 1520 msedge.exe 86 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87 PID 1520 wrote to memory of 2080 1520 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17437a264afe74078e5bade939e1ff16_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9965d46f8,0x7ff9965d4708,0x7ff9965d47182⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,13272257396444871321,6213579781192689233,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD53d794205566614d62f319ac742f86a81
SHA1f981344a623868814029defe2e693b0e50e533b6
SHA256db4a90bcb5c4a64560a35682d2e60721af216a254d57958728b5901e84b541cd
SHA5122fac07f06d726e62fae7ef7b5e3201c23bf7481f52b81ccfb6699e47a0e322ae5cafcf77ebcda3988ec6a44a723dc77a6fa7e6f690bf9e5127c30d255fe506d6
-
Filesize
6KB
MD592b50bca0bf243bd3bbeecf9a1d14023
SHA18bfd1312b2644bebe6ad18b2a4901f4feaa9e270
SHA256e37be3c6d5d3b8d602e911d0af101be01ec2709434644c09d3b197dd9df40c87
SHA51249698810123e49d2bc36cde6c54c0b1b64a40e819e6eb15be28425daf4cf2a21c0cb687eb36d33e7db0453041cffefd853f7aa30bd3ad6080d84f03751a33bfe
-
Filesize
5KB
MD53fc638c9faa4f75695b254fbb37cb4b7
SHA15e9f5f47ec2b071d366004966386a39667466d5a
SHA256cc0ba687c92821c97e6d83904461f928ec3aa7ca61af2105ea2214624fd2ae24
SHA512e01c0f373161e84d35518b03b0c113e48f5b6fdf659ee9403a6c1b9edc915709762fc4e66b9e3c5c842d3258da5019082a52352908083b24a660a6f75bd75843
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD587bb583937f7a7b7049c204f2a345bfa
SHA111247277fbd99fabf08c8a541ae236a734bd7000
SHA2568a33d2faafbc3b75399cde4103786e0ec77046509a063ffc71cac44f7ebe6269
SHA512e98971c10e46ef73744f7ffb7868a5afed8b8c7bbe7d8bd750ee137161b608c2c5332e45b6296b5ce734e0b922d7a7b52a03a5e6b17137279773797574e442e4