Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
17fbba0d744e07c76d6cc6c4de5e6293_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17fbba0d744e07c76d6cc6c4de5e6293_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
17fbba0d744e07c76d6cc6c4de5e6293_JaffaCakes118.html
-
Size
14KB
-
MD5
17fbba0d744e07c76d6cc6c4de5e6293
-
SHA1
cb2c35490e2f5c0080f2e798a062732c170be2db
-
SHA256
41190cb404d3bd0a09a03e032fec03c7a2fe2712013dda567381dcaada7cf097
-
SHA512
4e5ecbd38cd5c3c85dcebf314663318efddd372dd58f05d0d88880ed6d83dccbe629e9b4da8c888f1c0b4a7514f92226b12b89bf37db42067c77affb2f736715
-
SSDEEP
384:HhcZdOsJ3e36QZYOAHthaXlyryI8YueHR:BcZdOsJOKQZYOMaXEuI8YuU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 456 msedge.exe 456 msedge.exe 4668 msedge.exe 4668 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4928 4668 msedge.exe 81 PID 4668 wrote to memory of 4928 4668 msedge.exe 81 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 4356 4668 msedge.exe 82 PID 4668 wrote to memory of 456 4668 msedge.exe 83 PID 4668 wrote to memory of 456 4668 msedge.exe 83 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84 PID 4668 wrote to memory of 640 4668 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17fbba0d744e07c76d6cc6c4de5e6293_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,9084286970435861159,13052405323483138071,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD5b10ecfc685f926a8cd64366974ac4b9f
SHA14306c7626df2062dc43cbd7df6d9666cc5c5191e
SHA2560f02c403bbe30c514d41f9ca4da6494d62c964ec3a544cc9346edfe61a983842
SHA512ee61438deb79445439f90c8d1a71371ea51227d8ca138be7f0756c1968b8fc2fef46fe131078dcfed679c0e091b1efda63af38d4ae7eeae1ed82887c9d5ab20d
-
Filesize
6KB
MD53244aba3530ac115804b4c5e746a4722
SHA192b9e2d94d0710b909549423ee21e829f183d8c5
SHA256e02a18e123a506ecdb70f003cb520f9a2d85676517476b444d3bbfbe7387a424
SHA512ba55a46704f18cb4523bafff2943dbaf4de61dbe1860a2b552d15d0028611e76f32482af04812f0f118362e6ddb8a8e6fd23d90f7635ff3a26facf0afaa6110c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD591b4cc6bb616245b7a49bf103b661599
SHA1d884d2a0823891c13d38525ce57072eb3e97dde8
SHA2567effaefed346ecf0c9955f75ef173c1333a3c903f582c6c6819f79292299d7b8
SHA51229935b2a123d83bbf95132e2f051899ebd347b2b96e18d0dd7efb9f5826d4de0e57f2c83dff0a7f93c360c1000fdbf03c016414f465d7843f0ae7ed89e355d35