Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
17af17a9eb3d97abdc8df70e7ac19a0e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17af17a9eb3d97abdc8df70e7ac19a0e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
17af17a9eb3d97abdc8df70e7ac19a0e_JaffaCakes118.html
-
Size
139KB
-
MD5
17af17a9eb3d97abdc8df70e7ac19a0e
-
SHA1
8943f36623d1272dedb9231eac0b02ce1a3be9e7
-
SHA256
bb278c918e6940aace54066aff731a044b694d8246011c36f05581b8d84cbda6
-
SHA512
deec54e305fb9c03df9e5a71316d9dd97009470e3de396ed87b8cb8521e031526b9f5889a2851fc865c420f9dc26fedb34f26011fa9ed8d6a047ee8443854c03
-
SSDEEP
3072:SKg2u2GRq+xyfkMY+BES09JXAnyrZalI+YQ:SNGsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 4872 msedge.exe 4872 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe 4872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 2644 4872 msedge.exe 82 PID 4872 wrote to memory of 2644 4872 msedge.exe 82 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 216 4872 msedge.exe 83 PID 4872 wrote to memory of 5028 4872 msedge.exe 84 PID 4872 wrote to memory of 5028 4872 msedge.exe 84 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85 PID 4872 wrote to memory of 2120 4872 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17af17a9eb3d97abdc8df70e7ac19a0e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff201c46f8,0x7fff201c4708,0x7fff201c47182⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11950066562673915240,4037735117077893236,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,11950066562673915240,4037735117077893236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,11950066562673915240,4037735117077893236,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11950066562673915240,4037735117077893236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11950066562673915240,4037735117077893236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11950066562673915240,4037735117077893236,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5dc728bbafbf22aadafa61c2c9249b05b
SHA18f4b97af172fa613b253bb0e9e13b22633874e30
SHA256c6ae683d0d2a75b7f9046cc3baadcc15360d60e833234e94d9ac6ff3a22109bb
SHA5128b079d7d8a4a131d7af91060349739b1fdc0d89a15da6418135b4b0d35ac0e38252ef5468915232eeb4367a5fb6783051d736e414bdd1dc7ce409159e16697b5
-
Filesize
6KB
MD564d289563958b98127f737cc8a378580
SHA1577695c876aa9b68f9d7f2ee22ba634de238e222
SHA25678d747c5f32e2e5a8c9e25946652f15d1b4e45047a6a5d71582c9f890c2a5707
SHA51246c402f28ff1eecd4a0bc69a7a2670d8b83c4c24a17f28132fdb18f0851a8f704733b82a4d31a4ef3ea0a0e3a56c6ae07ff93a52f67ff11e95422751636785a5
-
Filesize
11KB
MD53d4759f553afdbc47aa9f01d22c07984
SHA1d4c51c40105982e9bda13518956b1f504bebdb95
SHA256572e1ec921ce8892be085456c22fd855f48ddae65a0ab343c27ddaf1fe22023b
SHA512f8470c9e8df43e3733e00345eca93ad21dca560549a2cdcea380576a41e254f758c240cb7627fa41929d55e96c76d0e4dd13afda506f16b945868d1f9c2f7332