Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
17757ca0566b6ae80ae9d96e8fce0bf9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17757ca0566b6ae80ae9d96e8fce0bf9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17757ca0566b6ae80ae9d96e8fce0bf9_JaffaCakes118.html
-
Size
131KB
-
MD5
17757ca0566b6ae80ae9d96e8fce0bf9
-
SHA1
8e60775e629f40b7db0a8e022608cd4adcdef3a6
-
SHA256
6df3ec5e979c6ae95bebcd30d4d4b6d83c87272f2103dd61f65a4839fae5b671
-
SHA512
7f1e531735863d7dea0c31f92bf4281bc17cf9d283d66e0907ffd1646178e9ba78ca3a0a9661cb33296c512623ffe17b1459c418f65e23f1016b164655345a3a
-
SSDEEP
3072:8PipoSL+QK7aoPu874Oqh3b5BSoQQyesMHFchfej4ZKBU:9yCh3o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 5104 msedge.exe 5104 msedge.exe 1804 identity_helper.exe 1804 identity_helper.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe 1720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe 5104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5104 wrote to memory of 2356 5104 msedge.exe 84 PID 5104 wrote to memory of 2356 5104 msedge.exe 84 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 804 5104 msedge.exe 85 PID 5104 wrote to memory of 4364 5104 msedge.exe 86 PID 5104 wrote to memory of 4364 5104 msedge.exe 86 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87 PID 5104 wrote to memory of 4112 5104 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17757ca0566b6ae80ae9d96e8fce0bf9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca21f46f8,0x7ffca21f4708,0x7ffca21f47182⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 /prefetch:22⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2288,312566453072183759,18345663481020753136,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5464 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD589b1c9561dfc540a7cba83fca2d49d3a
SHA13ae46d682464d5f91e8e26c6d2b57c6d8e76919f
SHA2562332e0f6a9143fe16f4d46b41ab43fdf5306d6a30a961d19c422940be98b5aca
SHA5124df9245c2a5ef437e66e20ea9789bb693d1a95ee472bdb178f8fddd8a0af524f09587728e185b8921178bd5a30cf1ec9c06ea579e403bd3c9ff588df84eee05a
-
Filesize
835B
MD59470df968d760be857d858a07e15651b
SHA13676ede4154e1a5597fd6f655ec8a2d5471d0fb7
SHA256e673456a80ddcecc52962604877c6bf0220c7ca367ec665ba0eab84d0e540ed3
SHA5124f3f0fd4029e509f4e28d4d7c040397b086087ba4919eb9f032f95ff51f2bd22d2c2228e7938cc2d0eabf21c1d2b73d47f9b406c0c6eef7d530ff0d9e9aeee5d
-
Filesize
5KB
MD5e42bee33b4ced77cff1b9c7220616a6c
SHA1a242280d6d2287f868201d8654c8453a6e611a9d
SHA256bf294ac6ad9bd5fa0f3273f55ee77735b2f3aa36470bd42324e6a1c73e1e8377
SHA512ec5a5dbd79a7c7f50c8f374733faf477ccf6c79694e0f12fe1f4e1e86e1a9b33006f880ed96708c11f87654d1ff666908cb2014e156069c4cd090ad75e342eaa
-
Filesize
6KB
MD50135dc527c15c22a690d7eeb1a702391
SHA159b34d5226d48c0712d206e6c270f224f19d1a50
SHA256bbef86509731c575a88df6f67bfc140940c5b0fbe7cdd7ca8f2a41f1c67779b9
SHA512ea1b3d99643af80983fbc547e5d55ba497adc2a2aabc541495503bd969ba30b9c2317961d9780f21a56c4d9ac17be31e1335e9c0db29e3dda2e07879d23ec54b
-
Filesize
6KB
MD5f1b1340e83a056fe9be11e40f37c2958
SHA10a9cfa7a112a1cd2776a45fc4d79358f1b0a97e8
SHA256bf5fc422253656262c8bd9a031b5c98ec1cd42835b818cf25618a797e5e5e89f
SHA512f820fb7705b130482f2b7469374a38e1b4b3bce45e43ae7cbfd9821dc6185d621cfbc386b85858d63ad8a13ec39d0964bd2844c9cc07854f4b52af7d1ddfefe6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5770fd5e531772e1e9b4671e265e7a435
SHA12e92626a71040db098c6c461f5c3e99fd036828c
SHA256a6f71c16f8589a00fcdda1c9f2034ea79a05c11f229503a8a9ff775f421f67ba
SHA51220c1a5caf39138c3ea992e91c16eb45eca4c3f93bf5230c58b51404acd3d0ac6d8c28a04a7d1e5b39a4815a093b03d227ff284261ac7059ab55a469db7da4b81