Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
17785dec47c39133cd26443800b41996_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17785dec47c39133cd26443800b41996_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17785dec47c39133cd26443800b41996_JaffaCakes118.html
-
Size
36KB
-
MD5
17785dec47c39133cd26443800b41996
-
SHA1
26d3116fd700f67c47c4a1b7585c51d933e41422
-
SHA256
d04af9ab861705c7f8ce0555bab73ffeb4c786256706f3b305b09e4407d11d38
-
SHA512
b00a201ea18f9ccf92eea859d3d669388ed16d070b31eb72adac0e49f814bbe385a8f12d898937f1b5a763d8210cfc9f2234ecef98df747fb5449b7f6ef9e6b8
-
SSDEEP
768:zwx/MDTHAa88hARHZPXeE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TIZOf6sggf6lLRU:Q/LbJxNVNu0Sx/P8LK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 2068 msedge.exe 2068 msedge.exe 5032 identity_helper.exe 5032 identity_helper.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1780 2068 msedge.exe 83 PID 2068 wrote to memory of 1780 2068 msedge.exe 83 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 2644 2068 msedge.exe 84 PID 2068 wrote to memory of 4988 2068 msedge.exe 85 PID 2068 wrote to memory of 4988 2068 msedge.exe 85 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86 PID 2068 wrote to memory of 5048 2068 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17785dec47c39133cd26443800b41996_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4c6746f8,0x7ffe4c674708,0x7ffe4c6747182⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3384 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14517987539338101561,15742701362039761221,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
613B
MD554117bd650cab0adadb4adf6ff22e0e4
SHA1de32692a80b252038c4f41816760af831eafffc1
SHA256ef86001c9e0baf3f56171cb7f9418f9a52d5bb697343744c213ae06372f45e3e
SHA512b803b68c6a9c3553ad9e0ba59003a2b9ece0bdeab4148a151c0143aceb27d3a0dad17115e76eac53c2c6827340ca3b84e6e4684232d01a68973f6d907dd90870
-
Filesize
5KB
MD546d2e984f9c3280c6f2eb31ed2005131
SHA1d66df30ebf899afb5fe0a42e74b712c34ae4171d
SHA2560bc7928f7433b7f6cd70e06663acfbe80ceb0547762d4f2d6289de301082fafd
SHA512e8eaa04beebe4be0692308eeea5bbd494c9ab2e5e568782b1ea57b6f269ffd93dd47ad9a045a6f5fdc9ca2ab155195006de512e7bf3c9dd91e30cbd3fea8eddf
-
Filesize
6KB
MD589b649c8646b20ac684267c5b04de634
SHA13c6d75b70b34f35297c1ff977197f4f4bb020207
SHA25658b26208a93fb336d8791eb7beefe98f3f6e262cb339979ee6ade4082bf1dc9a
SHA512b11420cbb77ea075d773278e9ce35e37de35b9e14fc8a9cc927362d9de73b7ac1c5bb68f5f3bd146deec3db2b3167e16a946fcb94c67f686c3c1b3f711844cea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55f5a5647957661d800c1d3838faeaf22
SHA1345216b64fc69edc5d62b07780b3aa39d8061316
SHA256282dddf5fcaa46c846f14e2c80a706b261669bd95d5be70f2760076b9e879d9f
SHA51250aafa5313b6378b676b81f5969621b04b0cfd97a01815c66ab7edfd561655a219565eb41795d9b3b4e7db751723a4310183f46e536f8b14519abd9bbf311bb1