Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
17c96c1bc030e861f54bc4438bedfd46_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
17c96c1bc030e861f54bc4438bedfd46_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17c96c1bc030e861f54bc4438bedfd46_JaffaCakes118.html
-
Size
83KB
-
MD5
17c96c1bc030e861f54bc4438bedfd46
-
SHA1
0cece949642c9ab159a47bace182b43c830543a0
-
SHA256
00916e51e4c3237e08c5543b295d79bc614bdda10921fdec1c0bc5259c0fafc2
-
SHA512
bf0522f43e35cf6e80d4caac195f45ebc3f9cbf8b91d71b188753d50e70488005a65186c1f6a715b9a4b8b1523460c280084298809aa74b4b8fb353382eacf26
-
SSDEEP
1536:Mzuhf9YIcNyfHJx74FFUIWeHcU+H8q7uYUDf6TJ0:Mzuhf0Nyr0FYS+H6Ff6TO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4120 msedge.exe 4120 msedge.exe 1352 identity_helper.exe 1352 identity_helper.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 936 4120 msedge.exe 85 PID 4120 wrote to memory of 936 4120 msedge.exe 85 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 3032 4120 msedge.exe 86 PID 4120 wrote to memory of 4612 4120 msedge.exe 87 PID 4120 wrote to memory of 4612 4120 msedge.exe 87 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88 PID 4120 wrote to memory of 3708 4120 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17c96c1bc030e861f54bc4438bedfd46_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe23746f8,0x7fffe2374708,0x7fffe23747182⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,994796143938777366,8022133730352604798,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
395B
MD538a0a17ceeed3d11538a29821f73abdc
SHA100f8aba0b2cca3c327b26509165143da3fe30062
SHA256792f8e6f52134b1496a4f02b13f15fb1beb38390ece9819ba018853ef1ccf205
SHA512032c3bd6f63dbec2d9c8d8f2913fdb771a7cf70d3c4f09a9c988b75e4225620cf95c15da666f2847097ed64e822d6eed5029a64f891b2b1bacf862ca0e429f57
-
Filesize
6KB
MD5f4a094b9c108e97a30a621dfb6d16d01
SHA1559779d2fc539e233401438718a1e34e668c44d5
SHA256a9e67e1d21f38c04e5069746d750710e9b1fee41e48bcffc65ac25039b5765cf
SHA512df6a5d2888387b97ab10db8534527deb28a20f11b2f172fe52c8d385216b672c5feaf84d6a6b60d4daf22959f43b0132d9a76f9630c6daeffc5ca88d7c19d2ad
-
Filesize
6KB
MD5249f18328b83df6f9800cc771834c902
SHA192fe11c2a8b4bc347d4cb799b2a16ec539b88b2f
SHA2567ca92737b7b6e0a2547f6a98005a9a774fcefc1bdfff99476f9c29d5894173f2
SHA512410356f07a64803906665b58ef1fa86b57c9be864c840bc57a2cc859b2980aff841b3d69f928d5556b1efead816801c5b05efa6e18703c184255b6b2be796c6f
-
Filesize
5KB
MD5ac50107f068f5c9f919fbb8bc6cd4c81
SHA1e4f2a41cf3447917157b3a11c5570badb70ef808
SHA2564cd03c3e1775d65e237ac4a877a53eff588335a4bcd7b3e82837bc77c026cb25
SHA5128387539ce86ec8026fffb3897cce69459401afb836b99eae5d6ff493c43ed1f32d8b2d8cf67ce699c11000a59d1279618a271f133dee5b591bb8d9e3e76e9f2f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e8af0f4170ff2934cafcf65352fc4f1d
SHA1b7d68fa7abbcf2523b4a9574f9841223be1b08cb
SHA256d1b91ce9c71d3a5816792b926042caa11a8e8e967ee509f13d18dff7c1fccf1c
SHA512af3d8792b009ddb9ce7955432b646a5527581a35b236a08aba2209d37117ca39440045f79ad0d00db12e17e2619fbbd6642c4456f6b13d20bb8b11095eac6f40