Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
78b1495296c3669431259a04426e73e6_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
78b1495296c3669431259a04426e73e6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78b1495296c3669431259a04426e73e6_JaffaCakes118.html
-
Size
238KB
-
MD5
78b1495296c3669431259a04426e73e6
-
SHA1
a3e8977624a36fa54adb128de67eef98c371535d
-
SHA256
c64d7e010c9c6f8088ec1b32f974b91721e98658a93c88a5b09931f285e70b53
-
SHA512
7ccc7d6c77d065b0bc5be38025df7d37333a9493a6d2a4a45826f8875786cd221d5d5e52f7e7292ff105e5fb884137febbef359a411263f48cce5194442b6002
-
SSDEEP
3072:S/csyfkMY+BES09JXAnyrZalI+YFyfkMY+BES09JXAnyrZalI+YQ:S0RsMYod+X3oI+YwsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3472 msedge.exe 3472 msedge.exe 4800 msedge.exe 4800 msedge.exe 2444 identity_helper.exe 2444 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4800 wrote to memory of 4160 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 4160 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 2988 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3472 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3472 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe PID 4800 wrote to memory of 3512 4800 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78b1495296c3669431259a04426e73e6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:4160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 /prefetch:82⤵PID:3512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4372
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2520
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:628
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:4340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:1692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4380
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2067016060306642753,12747097633778662356,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
182B
MD521288b4d9c0c0113b527ea64b5388e34
SHA1634686f9842986ab0a3419eda6aa8f70f9c388cc
SHA2564c7d2bb7f631e4d60278030e90bba17d19e024ba27d9b3e980587f3525561788
SHA51245cb5e6cac3cff3a39b3e7f14c3b7eca0003c69218d69a8426e7cb843ac87dcfcf5e8e2149da337265a8ad2aa9d899956686a7dc569875dfe33efbbc3ee50d71
-
Filesize
5KB
MD58d341eb96854e6efa94be12b9ccebae0
SHA18d944d75581e54076398918d2e5855dfc1d69886
SHA2568df9894f3a8b72f205b329779ac7f26561c04d7084007e9f040586fdaf3c25d6
SHA512108ea748e546c469609a8a8325e1a75e51375734f29afe60a38d5b69e4cb6380ff88698cbefd9935bfa018fd33a23e4da63c889ecb027bc81b3a8cb9a38b8ea2
-
Filesize
6KB
MD52ce0f2e9574a6c39156d163da9ae9b9c
SHA1c7e5dfcb62009f37dbe9cd1dc8646ecfd31816b7
SHA2563e5d4a08dce53a5269f1b3a82aabc87862e76a26c8ab9d3d3139a41574271ee9
SHA512f76b1a4d6c996568c46f0b3979f5bd74a0eba570f9fcc8f2d6b8e7cb52eb15697ad0b27ec2795a81b67a1518a8a53473fe40ed9b2005315c22f54a29c478e87c
-
Filesize
6KB
MD526db0d24c1d4c63d938f1c4c23ff6697
SHA1af6331ddbb15616e9cc44258bf41cd40aab17863
SHA256fb1075f6a034614291c5a39c287e11d8d3920b128b15a526fd70f58086a21de2
SHA512bed31633dcadb2f04e36c45f163b553937dc2994c2b08b5c71cc5e42d58295f5a14b37102f5ae3877721e0a366f223e0a3aea2b6eb721b2e4deaf35edd26ad2a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5847b29539f5251234747a7214f952183
SHA1906732bd2aa09548e74e323db588ab3693eec8d2
SHA25666f15b45eae541796da2990e66e70e0dea440311365551ba18d477241a43f5fd
SHA51204df6e8fa76fdc3f867bf45f7ae21c5a760e312d9fd46cad369cff34a669df662b123717d8d5cf47c018152a0cba6c258878332a60a018950b5787dbc597eb7b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e