Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
17f44e4d3d030613927598c7fabce0e6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17f44e4d3d030613927598c7fabce0e6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
17f44e4d3d030613927598c7fabce0e6_JaffaCakes118.html
-
Size
8KB
-
MD5
17f44e4d3d030613927598c7fabce0e6
-
SHA1
453fd1897dc9a5c1985ff12b92aa091d5a4b8b82
-
SHA256
9c667e53512816f5e8ef901019c3e4bf76e9a2aa6276436aef973825d043e1cb
-
SHA512
aec14971a3030509e36abace1b2570305588525decbcc81f875222073027d71315632913616b2989cf9145cf65b988423adbaee0e6e50df013c9d58e58b08d23
-
SSDEEP
96:rRfVF/P9VRLZwANU6GW3z0QtWrUs81+R/5l/6VwS:df53Z2s3YWWl81Q/5l/62S
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 3856 msedge.exe 3856 msedge.exe 4276 identity_helper.exe 4276 identity_helper.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 4848 3856 msedge.exe 85 PID 3856 wrote to memory of 4848 3856 msedge.exe 85 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 3212 3856 msedge.exe 86 PID 3856 wrote to memory of 1960 3856 msedge.exe 87 PID 3856 wrote to memory of 1960 3856 msedge.exe 87 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88 PID 3856 wrote to memory of 1172 3856 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17f44e4d3d030613927598c7fabce0e6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd329346f8,0x7ffd32934708,0x7ffd329347182⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15709667678696354290,14023308890567700764,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
309B
MD5997c9084d9f4495c8492c67a48b9352e
SHA1c7cd9d705a744e29389dc307ce71db512b988387
SHA25619fe4c357a48a27afe4c799eb563d4468837c5f973011bc054b36c48db2bdfb5
SHA5124e5b45450b758e163ba20044068537a3b878fa572abd4ec7badb3b14c023bfe93c65f519676ffd8866ec6613c0960390c3c5ce85951f2db3207b5976dacd11b4
-
Filesize
6KB
MD52eb7afb2d49dfc5cf4a0787d16d4b36b
SHA11df7eb954d117f38e34d7b0ed54b7476b3566fa7
SHA2565d6c7f4f7a52684d1123594a52d78657a33680e3bf1ecedb60ba053462d3e44c
SHA512ad7e9b52c64797cf54c9eb274318f88f935936aa2077c3babde0ff638ce2fed066786254797aba0b6b70a777180ad88aa9a6492920355d8897baa15e72e11d66
-
Filesize
6KB
MD517806e23e6c5aa9fd0833d9638c86435
SHA1279f3f5a526701280b370665d9d9931f4df4156a
SHA2562e6580c922c6579d53c47bc349409161abe1e1c97e3d0c5d5882912780064fe9
SHA5129ee1cde2565930bcf7188884dd3ca09dc4ff9b635144ca42b7a0f1cfb34846e7d0bc0be72306ad49622edcfa033425c6d68b53d68fa708fff38563ecdfaafaa4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51ef9a2905f249407517c78aa5c20c632
SHA121387d6503895fa93dd561811f6bde4fecd66c0d
SHA2569fce96393e81bba44d9e36172388c60ece3c092bf1165cfb73aeadf56c78593e
SHA51298d8814751b0e74f57196a468709958d435e6ae3ef92404cbdaaa37ec4a0585521a5fead7bbafa4d7787e47f433c4da6f62b102c2772e5232e6491576ac6fa2c