Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
17a640f0e41227489e01a5d9e03b3356_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17a640f0e41227489e01a5d9e03b3356_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17a640f0e41227489e01a5d9e03b3356_JaffaCakes118.html
-
Size
312KB
-
MD5
17a640f0e41227489e01a5d9e03b3356
-
SHA1
2122b126e325045e1adeb4b3b7b2c7f92a6fcbe8
-
SHA256
9580fc72942d0257966ed96e781d7904510eb878dd6839a15ab6cbbccb189d4e
-
SHA512
1e8210f980deb91732c85640edbb3ee18ed6b46bfb4e53b7491e83d27571bfdbf7b8971d6b5a31b74ab2b3761bbb41bb4684954c46a8cbbf4c8b8dcc34bdce2e
-
SSDEEP
3072:MqFlMmnS+AsglE06r6bfuJYfJ6cmeV9nGWrhth8ZCkJVVXEATT2l4j2:bFlMmnS+lglE0Zo1JVVXEAHv2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 532 identity_helper.exe 532 identity_helper.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1652 1480 msedge.exe 84 PID 1480 wrote to memory of 1652 1480 msedge.exe 84 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 1112 1480 msedge.exe 85 PID 1480 wrote to memory of 3104 1480 msedge.exe 86 PID 1480 wrote to memory of 3104 1480 msedge.exe 86 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87 PID 1480 wrote to memory of 2648 1480 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17a640f0e41227489e01a5d9e03b3356_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffecdd946f8,0x7ffecdd94708,0x7ffecdd947182⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10932103156982835964,6463522686800140437,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD54fa4b68f3cda5a47e3c42bd966a47605
SHA1eae0814dc183381b85ba5cd036ad3eb3bede68e6
SHA2566a8e307159632d4ef06d8b8bc5952954bed1ca8cbca05030b97cf47b78eddbd3
SHA512bad81a10e724eebcd831cf5154afbb33c21b2a882f9c4125b673a0ce4e3f50189f105b034a93540fbd4006df072487786c115782e20849955639db63fa800373
-
Filesize
2KB
MD5a77f52bdc9a1aaa56330053de7e469d2
SHA12c142e95f4578022e208fdf588e08dd8354949eb
SHA25694a9c306bc7176600393735e7f5192da7d0a091a9c7bf9a9ede3c6a72f10f791
SHA512f49542c1b18a94a8ae622e374b16872790c9beeebee8d9fb0083ee63004627d52a3e84cb9547920bb8d75a41ac3b8e4fc7789845abd1f965d830152a7bd1d768
-
Filesize
2KB
MD5779c9958254805f3f89a5f0e3d4e1c1c
SHA1ead4b3e02e5af936f8efea3a189c0300b48cc15b
SHA25684bfd306a0657414b3055b70fed28f0c15c9fb813ad90da46b644449d9ba20b7
SHA5122cd3fa9adc486e9340ee7ad6ebab4ae8317ff31bc58841f1426aa0daf9b875b25611ea3d2d26a448b81808557cfec7fa4796dd3b2377061b1bbe17ad8a8bef49
-
Filesize
6KB
MD5fb8b02b082412f636795a242be3548a6
SHA11c2e8c320b18f1bb746c1ada591fcb40beed065b
SHA25672610e4deae2f21051fc71717e373a5c2489c55e077d51acb54c1ea5b1f5c3e5
SHA512eb175715e9e896590077cc020c4c1ea97464504077e487d4810e6eeeeaf22b97695a71197d9a2a59bf29ad244f3ca7e73252b0ed139f86248e546a84ec4b281c
-
Filesize
6KB
MD57e0408573762b50e07424cecbc3babb6
SHA1e0f9f288be7223669bc82ef055b877e4559da4a1
SHA256dca2608f480c2f00b991429eefb3695017f8996f60a320efb56858ecfaca6df6
SHA512c3c7c5d903be42e48196725b3e4e2a3fc70b797914591ea94fc3f96185f23fb3348ace99af9c69b59be6772e5aa523244da250d6a6792234aea1c5beba85b72f
-
Filesize
5KB
MD58cac95f900ddce1ac20a872e0e3fae00
SHA13a829ce2cd934b24ebf78801c4f3eb35c38f852d
SHA256a5e05a599d962b6f80d271f0c36f1debaf8f30a1d60560d18f94e089b43d6caa
SHA51240c6df98e1567196e3cb5a8dbf7371bc249c7b455881542c40f55f940777c178988318818d5d4a17d55d7001fc8776f2d81f2a7a785050f7f8746759589a1626
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5878aec8fde33b3720eec7c1ea975f3c6
SHA1e45187e2fa5c9047c12779c6eb351693a209e03d
SHA25695c9d53fcce46247acd634f041a5d4546730cf1c4e54d41f3920ffa08b194534
SHA5120d2af8331d7b06f132d221e604bcbe226abb560b34e1d573d3cf164eacfa50417b79ece9279117c197dad40c05dd1df35c38563f64601e74cf61fa6016e29f7d