Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 11:57
Static task
static1
Behavioral task
behavioral1
Sample
17901f7b959c407e00334dcd76a4c23d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17901f7b959c407e00334dcd76a4c23d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17901f7b959c407e00334dcd76a4c23d_JaffaCakes118.html
-
Size
14KB
-
MD5
17901f7b959c407e00334dcd76a4c23d
-
SHA1
0fce46e0ec06ddb652d15f8c81d2ea5acfc0e19f
-
SHA256
7243066ebe4b12feb8fbf8171ba512dd6285614d6cc4e817b70c46f76c5052f5
-
SHA512
b7980a4f35c069dc18f99ec15a56d96ef05f20b77e0bd8cebc02e4c156171ccc8c0f1fca44d0c41b2a39ea11204d20ecd789b8fb24f626082061790925cc7b98
-
SSDEEP
192:l2wAOA6IqK9aghFUy2KrjFhxo+pD0bR5x9Nf:lOUy2m3xtYT9R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 2668 msedge.exe 2668 msedge.exe 2236 identity_helper.exe 2236 identity_helper.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe 2108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 4728 2668 msedge.exe 83 PID 2668 wrote to memory of 4728 2668 msedge.exe 83 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 2472 2668 msedge.exe 84 PID 2668 wrote to memory of 4896 2668 msedge.exe 85 PID 2668 wrote to memory of 4896 2668 msedge.exe 85 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86 PID 2668 wrote to memory of 4904 2668 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17901f7b959c407e00334dcd76a4c23d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffc966f46f8,0x7ffc966f4708,0x7ffc966f47182⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18212403516508974538,10662054046109460752,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5496 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
1001B
MD55e3e82022ac33cb062a287d75c05c2e1
SHA1f41a2b00f63190735de1edfc62f49a0fdfd6d950
SHA2564101bdd63a0abc01da0efa5918d9663d13a89631d5ed92975c06850c680df835
SHA512a5673ce7af6f6b306f0f426814f3f9b632908b3f00f6f0691ecc3072b91182e17972e1ffdc79df0eb7d24ff478b390405fc961153bbab7d3913116dbcbfd2454
-
Filesize
5KB
MD55802a03e99949c51f10f8f464bbf7048
SHA12204a82957abdf10324effd7015f8518f0ffa00e
SHA2569d01d8f5ed459225499829d0fc3b729d997cc06c149b60a9ea4b88eec6197424
SHA51257ddc035bea9ac31a1de6d32d31840517f4214c09a928ca9d1229186af5ea1f0bf6347aa6df20e73c0020db905596f12ab1cf8fa83f6f011832eee912fc8dd9e
-
Filesize
6KB
MD584f14069ecc9d9d2f6f2b8176b6b3f16
SHA18db9ba59acfb2c736f96192cbf28d8eaab7b02fd
SHA256849b45d8edb5822e62e4d253713f2761be0d9975a06aa6de69b5ed8db2e66c11
SHA512e49eaa849b826f2d33842527fcc4707766bf63b756d202e18b33f8a99bb6c9edb4221136a1beb9ed487aa6e0ac321425e9f89c3f6246c4b591600bfdb6ea8c33
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54be9881369fd68a8a0cd5af10472c421
SHA1468f37eafa115b56c45e5e21265127e9964f094f
SHA2562a2a8d23ee84a48fbbc7cdb2235b64c7f77d6afcbcbb9c6661953bcf22be6d39
SHA512881bad868e31280c025112f8a9a41de96056063cd1e2ee98e4e0b2681ba21ce4a1c2ec9c68229ca9fc2e6758ba6c8ee3eb7ade781d7f55ad834541cd546a9333