Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
17e6e094d0ba84f04882f980dd4fb713_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
17e6e094d0ba84f04882f980dd4fb713_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17e6e094d0ba84f04882f980dd4fb713_JaffaCakes118.html
-
Size
90KB
-
MD5
17e6e094d0ba84f04882f980dd4fb713
-
SHA1
0273022c52f673920a62f3ca64f1e91c177b7cc5
-
SHA256
b370414d4890a1b8ab113f2d9316a41268f0ff4d6b798bf25ea59648dd128ad8
-
SHA512
236b0f5c06a183dcd89bd478b1235385a5f878ab38c77e030c76b72e688b27f7d7a08783a18eba49df07a6ae83ad85965b57e1ac014fe781536e85745651c584
-
SSDEEP
1536:gQZBCCOdY0IxClDq8EB2YwOP3fTaicmHytBZnI7nadZEnyyPSxrjOufaH2jNhWBj:gk2q0IxhPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 5064 msedge.exe 5064 msedge.exe 996 identity_helper.exe 996 identity_helper.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4940 5064 msedge.exe 82 PID 5064 wrote to memory of 4940 5064 msedge.exe 82 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 4212 5064 msedge.exe 83 PID 5064 wrote to memory of 1348 5064 msedge.exe 84 PID 5064 wrote to memory of 1348 5064 msedge.exe 84 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85 PID 5064 wrote to memory of 4484 5064 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17e6e094d0ba84f04882f980dd4fb713_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff849ee46f8,0x7ff849ee4708,0x7ff849ee47182⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17606882150750673064,4078889927312942678,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD56fe73489752baa98f12ba1b76505d3ff
SHA196ba06d006624da04fd62859ec37b514bee56d21
SHA2564d841fa9e429eb4f3e1dd925fac7dec6e86c8463032afeafee60e461ebe3c88d
SHA5125e5710389f91b598db0e7d302ef7a4cd94938372d50a3c8c8b4081549c8098f886667eef9a11ba08f8bf2974428179f9ed7b9b534e4d25f1385bd34bcfd1900f
-
Filesize
1KB
MD5246cfd8b3b394ee5bab3cfde67e30783
SHA17d211c5b0cae73fde1af2f513f3ed22659721dd0
SHA256a04e1cf9ede9ae69725f3e194e2e96c0bf78e19f0eefa95ff2011517959181cf
SHA51281f46a9ce74d1a9c548ad53e3f40ede89e657795ec26c5cf754f81576f3dc1d36b7e48699e1399d43063f95c58c5243e6ac90ffa651977ae530e77e4be1d2d11
-
Filesize
5KB
MD54a314e63f618e9f7d6a8c68393bbdbc1
SHA1e28c4e9dfae7fc54ed9eccf4b66956e29dc6df56
SHA256d9664a5dbd825635b4ab1d2df8f4d1742175cc4516bc7f79aa63160926a94b63
SHA512b2ac737734d646f40a3c67f3e41ee5dbcf51fc7b063b304baed2cd893bd7ebfc3f7d553442e422f2f996b55f37ab213b5d663586ff7c10cc39a72c9cba71043d
-
Filesize
6KB
MD5af14095cc520b92af9266ec79a4617cc
SHA1398a89d747e0659352f6a733a000a54f2f3eb8ec
SHA256d19997fb960af622221287cd7b8e79aa82a6d8c47316f7590bb6e06758dcd4bf
SHA51207c73e6f5b6063b269758217f4f84d856300287dd468ca04d51140f51dca70697ffb915d8042500cdc4765c19c6e20dd90d6bdcfad5354fda595c8af2d903126
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58153d542ea032a40035748976c9b158a
SHA1eedd7bf64286a6168593e799b991a521ef7ebdab
SHA2567826877e11c88d19729c4cbc57228c70397f7b9b61018823dc23f48c35357360
SHA512f6a1b9f7c823727b69f9fe30d6cbdc1b1454533bf7050bf45eed20bf5c5d9dcb72fc533e6b92696ba54bce659147564e4c9ce39ac349a3e5697bf56514deba81