Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
0d78b2e911c9eefea398fb2c7b94b913_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0d78b2e911c9eefea398fb2c7b94b913_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d78b2e911c9eefea398fb2c7b94b913_JaffaCakes118.html
-
Size
139KB
-
MD5
0d78b2e911c9eefea398fb2c7b94b913
-
SHA1
7896feca7cbfe31514bb48baff259aa5dd363ed8
-
SHA256
2fa58fed952f455aa0b5621913cf9c19b5fd5a81c39b232992707df203604809
-
SHA512
cfa2b8b9c0cab9d091f9cd68aa159e4ac7bcabccd3604deb4f3d466afcc0e4a5a2cf724e8098f8849eab1357696a51699603060f8dca759752776d9813f55035
-
SSDEEP
1536:SRT164YrYl8yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SR6byfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 3784 msedge.exe 3784 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3784 msedge.exe 3784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 4952 3784 msedge.exe 84 PID 3784 wrote to memory of 4952 3784 msedge.exe 84 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 700 3784 msedge.exe 85 PID 3784 wrote to memory of 4908 3784 msedge.exe 86 PID 3784 wrote to memory of 4908 3784 msedge.exe 86 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87 PID 3784 wrote to memory of 2780 3784 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d78b2e911c9eefea398fb2c7b94b913_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbfd346f8,0x7fffbfd34708,0x7fffbfd347182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,18287342706683346801,2095798300858394661,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,18287342706683346801,2095798300858394661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,18287342706683346801,2095798300858394661,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18287342706683346801,2095798300858394661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,18287342706683346801,2095798300858394661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,18287342706683346801,2095798300858394661,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
5KB
MD52e6814924e6db9f4dd70428fb65fe681
SHA1553d641288e852c3d1dd1f5ca5ec73ce3742749a
SHA256fbe96d613308e24fd0ce340a5a50746bd7627a44d086d61e87381ff5894c6935
SHA51236115c2d7914194b2e692a4707db3ad8216c85d6745e7f4cf448d3beb7f6b0d718c62c4ea112a3f4147d8fb79fb3bb754c592cbfa90a82c4bafcce36de52ded7
-
Filesize
6KB
MD56fd42942622e32f85bb8979974eca5bf
SHA123d34bc8f64d7ab7ce6e641b36366b0e14adda63
SHA2568f68f8fbc1ff66718f5f75e78af76934bb05403c6b3390bb60a9c61eb5dbb852
SHA5125018d2f2ccdac6e19b1537882067aed820de20c01dac293aced96c302128efc58472640abf7a537dcf3be3e91bade0a0ee04f0880413072b5c9489c80b49ab5e
-
Filesize
11KB
MD5601591f1a3710a665040f49f9c0be8d5
SHA1d8d287372e235a178ed58af0276afe0ff1293bde
SHA256f7eb86c1499ade3ce1098798fac76d1f1354e764285e9797f4c12e2513579ca0
SHA512102c029da156a49cca17a7720b2ff01f0de2f868dfb155d27d9c392c68a5063ea2267d95bde4667bd4fa3766d45467bf6f9bea906fa00751e8ade21eadef65e8