Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
17cf4e840edaabda1c3f3581746524df_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
17cf4e840edaabda1c3f3581746524df_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17cf4e840edaabda1c3f3581746524df_JaffaCakes118.html
-
Size
173KB
-
MD5
17cf4e840edaabda1c3f3581746524df
-
SHA1
19c08df0e6f9c836f2db138c90be1c724ff763c0
-
SHA256
8797ed24c1e16fd0fc4f7712c8b8eb1e3e59f97f69163fed70765808dcf5bda6
-
SHA512
b528f95859c9ae4bc5c977e94a0cdeed92f5264fda58a011d7070b614550bed19d6cce8e489949b1170cd858ca0f509486812f4fd225f73c7a85a2f412eedff3
-
SSDEEP
3072:3jQbd7SP3wCqbIrqbIVev1UqePE64M52c212+cZwXvWf2ptXJ5Qt8PZ6drTt8XwD:3jQbd+43IIIkePE6D5hdiwpB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 1428 msedge.exe 1428 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4132 1428 msedge.exe 84 PID 1428 wrote to memory of 4132 1428 msedge.exe 84 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 3656 1428 msedge.exe 85 PID 1428 wrote to memory of 5020 1428 msedge.exe 86 PID 1428 wrote to memory of 5020 1428 msedge.exe 86 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87 PID 1428 wrote to memory of 4984 1428 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17cf4e840edaabda1c3f3581746524df_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6d6446f8,0x7fff6d644708,0x7fff6d6447182⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,2625534774917361213,5879538769223637622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD59a267e70a932bb58e2ecaf52f789224b
SHA12b115c8483af92a1e4f61d14e4c4bef71fb2e65e
SHA25684fba9fcdce7a53e53a6842b707ad1f80c930617a95d0ed75ceba863ac1c6050
SHA51275fc21ec238c12890c564712f583ba68f3eadf72a0cb685ca0b2fa98f8427c7b8b49f6161b08ada843ae20a2cad2ee51110aa2e889c79636025a39c0b708c1ba
-
Filesize
2KB
MD5fe67637b7fd297409d061c8757c6ef23
SHA134659e230dbd562769d6ac579b1f1e1a6bb0de71
SHA2565aa4a00e26b6167189cee7159b4bdfeeb98fe917bdd2a51ce9eb780f8225eec0
SHA5121670b640ce88bf1e736f5659e11bdeca4ddea200725bbfc53acc8e42754fd1463eecbb282ad449296a5c63939035ff6ffd908dab1b05cebbbf38df6a47927abd
-
Filesize
5KB
MD505688149073da28265581cbb784991b1
SHA172065a5773214cd8950274e7ddd2239142f3bfbc
SHA256f832cda828bad5bde21cec4b5fba34d43e9b13244b3f17be1a59b1c6b19fc07d
SHA512f9daae968bbc1e39e84414a5919b8ac9279c2fa4e1c2340d98fea811b2541d7414b49983db32ec49eb3141f5e7b75cdf0247bb7eb53f223e968bf70eb9f1d8e7
-
Filesize
7KB
MD520254f9a06166c8f4955e874fa774ccb
SHA133c91aaa33d07e63f70eb3da6751487dcfbc8d77
SHA256aade00b7b988c94e059f5c1a4870bcae3a5b69134586afba0d451056a6d2c168
SHA512a9c73e60f02d82ad9ef68a82ab4e1250cf2cc9cf98189d8054fe04cbfe762b175696afc0d1faa4eac54361317843ad4fcc99271d309f1e1c56c62d7499f219c7
-
Filesize
7KB
MD51a306996c03171f41cf91608ac951b16
SHA18c533fb5dba8ae0e79897c44a5c745e26fc94baa
SHA25604d91cc8ebaf579770337937591b232afee863b234a88e904721fb4cb3adc740
SHA5129f35219983c67982ff5f44cde47b061a4a2bc11aa8f42e0141446be40f0e0b526985ed3d6f9449e554efdb267e181141a2a7decddfe126469422820778b07a8f
-
Filesize
6KB
MD573beacf0130dea40651e521a94b23e8d
SHA12f7ab099695ebe2c49528721c72daeaa23d2890b
SHA25616132dc32c587c93eb17708037c068e37624de3a0d3dc56a3be1b9272455cd71
SHA5122d0dae888663186f091e465793e5cb3c55a1978d7932651434c04a41ab046335380d0b1947fd2ca7205e96bc29e73388e84267fa8f6b6d26dd8f5125cfef0b23
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56d2ab9dfa8710ffae0312f01cec5aa86
SHA166ad71793b8a7ce69c47e2ef7a0486fdbf41a3b0
SHA2566bcc8cdd280d97fca9bbc95e4ba9d5c7c117376aebf61231903cc95ffd86b9ba
SHA512b34b31120905f27318aa2865d4cd6298a79595cf869eb4e17383b758e34c6e46f773badf36432171f0fd4507ff3b2df408db5cdeef264746d2db7cf3a5fba25b