Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
78625d8854cc58f7270ea3e01a836af6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78625d8854cc58f7270ea3e01a836af6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78625d8854cc58f7270ea3e01a836af6_JaffaCakes118.html
-
Size
20KB
-
MD5
78625d8854cc58f7270ea3e01a836af6
-
SHA1
4e5a4a34c31e9970c72b711db1f2eb10ab4b6694
-
SHA256
e77c439d61e724a5ed24deee5082172145c6e3f6de424a5154ecc0bf7f29e146
-
SHA512
ab86c9b271376171fe0508b1aedebd14bd1c747d965f5282a57cf04be7360c0511597d2ebded1af2184613ad8198ff13da16249a1282d10236dc169d5244c22a
-
SSDEEP
384:jkE2kEOkEvkEg+zpO6kCGpPZaoF8bW8hie6fLvECmPU3UBVWuDwP/RzY:jkE2kEOkEvkEDw6kJPZtf8hfKLQB4kwi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 3164 msedge.exe 3164 msedge.exe 2072 identity_helper.exe 2072 identity_helper.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 5016 3164 msedge.exe 83 PID 3164 wrote to memory of 5016 3164 msedge.exe 83 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 452 3164 msedge.exe 84 PID 3164 wrote to memory of 4008 3164 msedge.exe 85 PID 3164 wrote to memory of 4008 3164 msedge.exe 85 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86 PID 3164 wrote to memory of 1668 3164 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78625d8854cc58f7270ea3e01a836af6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd8946f8,0x7ffdbd894708,0x7ffdbd8947182⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,11263611138983197465,6348609355890338256,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
575B
MD5c94672f238b01abafa97736042e0a60d
SHA1455d7e69810fec41940a04af83a6f65d44dd15b5
SHA25639258597a369bff85c72324f2374e31a41667662029cbdc1943b4d87108d16bb
SHA5129423a6fc7988ac8482304fd3721fdb0f60b085e19f39053069a9ba38de5bbe94d2833596b42f32cddbb42e75ec29fafa2f71fc0ff0152158138b02cdad6b053a
-
Filesize
5KB
MD53306cef44a13f0a91f86efeca7dfe0f5
SHA1de8a96e33878961292ee8de81bbbe0dd53052a5d
SHA2562d059dfa16fba11dbd1450abc4db170a8b4ab622d1b1c7eef798d5fbbcc9eb12
SHA512f4f2b4ec7811ae1e56823a9bba7d3697506aa39f6da779dbc5b297919cee136110b446a829187be70836dbc07106d24eb763b8acc6495b4afd756586b1c272a9
-
Filesize
6KB
MD54dba98f25004a147ee6a50e1409d99eb
SHA1f355339dee1720bd05cb65e28e4fc21473b291fd
SHA256039f07be1e6c79269f17eef580badc0b407504bc97f09fd3816f2c98b8f8e6ac
SHA5121989452f5da52a2d93ca811c33146bd169caa409eaf5766203f3bf9a419bd4ffbd8a84ed39a1c49e9b4b3f8b0121a645fe79c1ed7a19e9af4dbf8ea5f1d0dfab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD574e80249dc3a26abf27e9da240b084c2
SHA1bccc8f29bc4798bd42bc89121015bc7e9242ff61
SHA25684b353de3cef06ed43f9eafc6455411335bb10d4598ae83bde2771910b773c6b
SHA512d81ae5d7dd7f5b40edef6cc75e4fc55c03f3dd369d730619450db5677672abd64c395b7369fb584ed19868569c0c7a8e2d25d3072ef2fe04dadb35de3dad4310