Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 12:55
Static task
static1
Behavioral task
behavioral1
Sample
17c461a4278033f91f41759adc31c630_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17c461a4278033f91f41759adc31c630_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17c461a4278033f91f41759adc31c630_JaffaCakes118.html
-
Size
48KB
-
MD5
17c461a4278033f91f41759adc31c630
-
SHA1
8a132a4699f8bde8428a2ac5d63202acdb3d60b9
-
SHA256
7833bdce308d98dafa04d6b0cbbb547cc748d14ee0dbb9b9e27d6934c648f4f9
-
SHA512
75c060b30d8eb8bdbea2a1f538edc87f8b3d762effd6745eb88f02204608d761665d6efad499684938343f46c520ade66cfb01b65a3c3bb44b952df8b123965e
-
SSDEEP
768:j/Vt97Rycy2aWzkHa3Z3MPCBTSaemAEL0jqckF8SC0/ZuOU:xt97Rycy2TD3iaZSaemAEL0jqck0b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 1540 msedge.exe 1540 msedge.exe 5072 identity_helper.exe 5072 identity_helper.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe 2032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1540 wrote to memory of 4808 1540 msedge.exe 83 PID 1540 wrote to memory of 4808 1540 msedge.exe 83 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 548 1540 msedge.exe 84 PID 1540 wrote to memory of 5056 1540 msedge.exe 85 PID 1540 wrote to memory of 5056 1540 msedge.exe 85 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86 PID 1540 wrote to memory of 2656 1540 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17c461a4278033f91f41759adc31c630_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafc4a46f8,0x7ffafc4a4708,0x7ffafc4a47182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,23309043381622824,8200914366618663467,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
474B
MD56fe5c2d2b1b984295fbe2d42bb88829a
SHA148b68411ad1cec71a755d1ff608aaa2c78a14e9e
SHA25621aa030f77c3905baf51caa1c2461eb7c94653e27a1f4b54862589cccf8a5ca8
SHA51280466038d1ec614bea29535ccfa7d38bd5012941e57c48812b2e362cb839d78aa56da8969e1aa132797fc616e7a6273a96623139c332b4bec1d893ca3e1fe1b2
-
Filesize
6KB
MD5ccf5c3c74e53aac7a80c83f466f190e8
SHA1940a48709aa9ddef849a5e6715893e8335480dcd
SHA256d20f043c4280f9988ef43590b607183bcd5ccf5175078e8142f210dee71edf1c
SHA512f6e3e00fe985c4c21f857449a01d108477366d25e36f8b970de14a0c1bc9f7e7f954d0b1d04d5437d1977901aaf75d5ba1c10eb570cb59bb937abb66be0552b5
-
Filesize
5KB
MD5bd2e0cba9dc3989fbd816fa9373ba831
SHA1b3854ca29dc75cddfd31d12e6cb22032bde921de
SHA256b3d1f17572a1dd7214b2b1641076f093153b380282c50225f50707afcc1cc4db
SHA5123a501e62a74abc67ca5701a386eac7a72f4f3a57d41fe448d98d803cd25e0433e74f6c3b2c6c42659830327b509e67415b4d1c579c964e4c65def0d2dccae5f4
-
Filesize
6KB
MD5981409ec5cf71bd5ca348b7bd05398bb
SHA1a13d7d2b057f88281566c492716680d30485ad25
SHA256a392a75c8e8c42384469324f9033050a25c6a39a068d7e47ebbb30a2e94a4db0
SHA5126bc72776c8ec9b909d50af5cca639eb5330c6faf84af8087724eaedcbb06667f2a4f2a39a36cfa882d506c9f6b50e652a263a05222c02f4d94424d761bc4d0a3
-
Filesize
371B
MD5dcfdb71f16db900a2e92e6c2a6345cf7
SHA14e7072ac74d4f0b017051790a930098e825a1e76
SHA25627bef2b30dc5a1bf9fdcd3669ff4f18c14f21f352b66ba24373bce86a710a19f
SHA512393d2f59b40c692b70bb380febafbb917609cdc2158e72d5f6c0f90ed5a62d2406927b6d504e031457e9b7a88aaeca7eb01bf4ec1cd39cb7f69c5c0a83efe9a9
-
Filesize
371B
MD52330cdf011dbb397d6b4f4910658af0f
SHA114d2382cc63da10f7538c630f589e3cee234f3d0
SHA256fd2bc53ce338ab25f4311346a0af9b64d47896dfe9a13d051c4450d0014b6605
SHA5129169232a3dc344b347a784732041c2109652648cdee041a23646f2e5c16d20f04728aa604210fe4046cc4c37df806c385d831071e42d8e47669f57b0bc2f88ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5304567940af84b947a696423643ee399
SHA134339b6d4061e534d4a4bac6054ecdbeced224ca
SHA256db5cea8cef19c35d96ce85adc41eedf0543d23a25ae1c30679c5c1f570f1ef77
SHA51255a3cdfd078fccd898bac6134c72a0b5913248706f1d7652d705d4dde2642e8b25eeaf46d7a5c2658961fd85759007dfccfba62604f8cb6b0a8c5b62688afa78