Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
78674d48be8939f332e5330bb94e21ba_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78674d48be8939f332e5330bb94e21ba_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78674d48be8939f332e5330bb94e21ba_JaffaCakes118.html
-
Size
70KB
-
MD5
78674d48be8939f332e5330bb94e21ba
-
SHA1
660b704d2c4f7ac5b9c716f7123572b3aaa6693a
-
SHA256
3227e1f615239aa702d074ef47c8a43453dba5fe7124936d482465045b57e5f0
-
SHA512
78963176ed51d3f783ad74c527b0fb37cc985a7a15956738bf2b9418ec402ff68aa202828c0c149eb976ca2dee18ec040701a0a2418e56c0e616701ad796e68e
-
SSDEEP
768:JiTgcMWR3sI2PDDnd0g6ciIc5oT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8F:JrFTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3368 msedge.exe 3368 msedge.exe 856 msedge.exe 856 msedge.exe 2260 identity_helper.exe 2260 identity_helper.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe 2576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe 856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 964 856 msedge.exe 85 PID 856 wrote to memory of 964 856 msedge.exe 85 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 4180 856 msedge.exe 86 PID 856 wrote to memory of 3368 856 msedge.exe 87 PID 856 wrote to memory of 3368 856 msedge.exe 87 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88 PID 856 wrote to memory of 2988 856 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78674d48be8939f332e5330bb94e21ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe410b46f8,0x7ffe410b4708,0x7ffe410b47182⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1916 /prefetch:82⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,12485897225887483213,17146523288042961891,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD597ad4dd69e6ac4a96be2d9e32a434766
SHA11fdc041f7db84dfdf4b1a7365f274992ad670944
SHA25609a4fdfdc02251d1613bf762baa7e62e97b9335d2f10b639f48d3c85a11cb75d
SHA512c4db070bbbe278266e42e16974a0efafa59f5ce74edbf3f6f0a32e27dc032dedbe06fe04273a59ce8aacd799cb1d04e29f455a52ba82b6f340e55823654e658b
-
Filesize
6KB
MD52336c296dfed1df3a267916766cb6dc1
SHA17c245d2d28dd0d7e67916547a5b8bb6696b3d6c3
SHA25684620b02c23ee80e1c84ab4d5a7e4cf0faff75be36c43b36d6a4d98ce9762a62
SHA512bea4499b1743c44d1890492c3c1c8d89dd9568acdc7dd3436b5b234d55b3f5ec3a8255d37b988e046ee750e6aaad825020c1397c15085984cbcdaeac0c12f225
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b9377ddc236f2fc2032b0af2aa11631c
SHA153d90091ad87b7df037252b1ced98089e81ac497
SHA2564d8e6da41236cc1b1e628afd93c444022dd913e7ef22a6a2628632844b3e9e91
SHA51227b7175d92a2778d7c7b8d38c834d7eb0e318b1e17aa8da5906538263932dbb69c7fa448b28c33494ea4168f2cea390525908dd580f019c547b5e5cf73e45655