Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 13:44
Static task
static1
Behavioral task
behavioral1
Sample
17f2c5c946f5d98b7c0151c3918edd31_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17f2c5c946f5d98b7c0151c3918edd31_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17f2c5c946f5d98b7c0151c3918edd31_JaffaCakes118.html
-
Size
57KB
-
MD5
17f2c5c946f5d98b7c0151c3918edd31
-
SHA1
6a4e1b39bb8b7733eb8614695636f9a1962e560e
-
SHA256
786880300549f29cff43b5f1537950fa33798cd48638526faa5ec8a06376fbc6
-
SHA512
79b8794162ab9dd61e8830939b224bce3d750206c200a57518c2819ac3162ea662dea66a2c1e0de996d54421d496e0dfa69ca1e86e0bee7c0d5219a311aef08c
-
SSDEEP
1536:jXSQnRfatgQX/BrguxWDzlT+ABOGdbbz3qIlbgRCsOR37aX:7Skf7a/EzLlbn37aX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 3480 msedge.exe 3480 msedge.exe 1432 identity_helper.exe 1432 identity_helper.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 544 3480 msedge.exe 85 PID 3480 wrote to memory of 544 3480 msedge.exe 85 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 3860 3480 msedge.exe 86 PID 3480 wrote to memory of 2420 3480 msedge.exe 87 PID 3480 wrote to memory of 2420 3480 msedge.exe 87 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88 PID 3480 wrote to memory of 4184 3480 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17f2c5c946f5d98b7c0151c3918edd31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3bd946f8,0x7ffe3bd94708,0x7ffe3bd947182⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5285379797794441656,4536108458977294007,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x398 0x5101⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD50a596d65c45e3cbbe38d39cad8f109d9
SHA15eb3b5ff7c79e0d461db3da63d7e949e84f3585f
SHA2563029ebb9f109978d1a66c561e158fc53351c1ab1aeae33eec2dd785348fb8baf
SHA51250484c163208d0216798a47620e543eb681ce200443b271a366c56daf8af6abbdaadce996a983083bef981e9ef2e35eea4c1f63a2a223851bb78a21f9c9638a5
-
Filesize
625B
MD57511aa8e77589823720b946fdcd1329d
SHA1719b78cbde5c1a47c77757d61139056e731335e6
SHA2562ed167e04913709de477fccffe5017e6b90d955f3cbea85631baf9b172a866f6
SHA512a2d57c27766ca3e55367d2e424db846182cf874b18d21e9a874c1593eb5c6a1d9152818b03dea169e32e94cb6c6dbd59ab5e946e74c61597e2ee090126275948
-
Filesize
6KB
MD505e91a323003d9b6ae7a753bca850f48
SHA14657dca08761e4c9c1a05fd0539093342bd44302
SHA256277c0ba4350d93544285c77b43db6620c3e97983869eebabc9e31fc8606db18c
SHA512b3eeac7007f2b67c9dc8ce887d7553214585e8529f7b92ac3cbed8f47efa227bd49ef684c4b82f2b0fd44b105e4d006568813a3f30bfc03a5140fb0f1686713c
-
Filesize
5KB
MD58f6bd5cd293aa4169531afadb70e4749
SHA151660ac706b603c2e1c21c18853b3f4b53e751d8
SHA256714a3bf673920e73a7ac40e93968330de75b782246dabfe7ada3b249aa225e3c
SHA512a27c90b70426ecb600de72b0aecc4a3a79c627de6095ce67439d22e4cc1a036c00b2f3fbff8c3937fb81ea5e2428b542355ae6a9954110eac0e03e4200d0a3e1
-
Filesize
6KB
MD5fb34104dc2254195efcb86af4b2332b9
SHA163efdb29015f54a316c39f4aaae806ba6c7dc89b
SHA256368a3829f4fdf673f0a7494986448a217b62422fb82f22aa26900f322a6b5b5a
SHA5128f52f8507d554d35981a14d29c8aaebeb5570d7008d62bc2406e07e2645fa2e48770eaa15a9278dd98e76a6e4f4c6e7b869d51f9a655423f48f0f6b7feb0c806
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a4eaab630d60f34e8e5b8ff21377fb8c
SHA187ddff689476a9f8c2a7043c3372b49a87ce03f8
SHA256c0e7fa04f54016ddf89be3c97de4064ab2168b5771e2e4d475ff6e43e97fb01d
SHA5126b251d0f99af06c0a28133e73a20ce601324390c5bd42d78dfdf236404fe123a887230cc8f91228465bbc1dbc2a9f5436df909349101239c7c567ac6dd540f09