Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
78c1791a61b49894c7fffb2886232cfc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78c1791a61b49894c7fffb2886232cfc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78c1791a61b49894c7fffb2886232cfc_JaffaCakes118.html
-
Size
460KB
-
MD5
78c1791a61b49894c7fffb2886232cfc
-
SHA1
cf48e864b5fe9c227efae6d952b888565f80bc3a
-
SHA256
ec5059f2ecb2943998f4cd2d353d3fe7b1ab0e49095b9ac9c28aea09f68acc5a
-
SHA512
7d08165ab5dfa7755e8bae646fe433ebecf8199a30804e72f34a111df01c148158025be1d925a501e3a1749163df722ecd2e60f27084404dc3bba1529cd14e18
-
SSDEEP
6144:S5sMYod+X3oI+YKsMYod+X3oI+YLsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3u5d+X3p5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 4788 msedge.exe 4788 msedge.exe 4564 identity_helper.exe 4564 identity_helper.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 2252 4788 msedge.exe 83 PID 4788 wrote to memory of 2252 4788 msedge.exe 83 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 2196 4788 msedge.exe 84 PID 4788 wrote to memory of 1480 4788 msedge.exe 85 PID 4788 wrote to memory of 1480 4788 msedge.exe 85 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86 PID 4788 wrote to memory of 1108 4788 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78c1791a61b49894c7fffb2886232cfc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7d46f8,0x7ffd6b7d4708,0x7ffd6b7d47182⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4997844433549784032,3854274411049340394,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD57deb7c5a0c4d822fbb28fdb4f2883c78
SHA1accb9a799510b33cd1dd0b76f43a29551c1ca35a
SHA2568b3b95c494b216cfa27e28922b36bf6168c5d5db8552bd114683ed4fbac9e315
SHA5120a040c807cf612d00db9f9a2b8461b9782b556700192984a19cae4688f467f46ffeabf6a4692da5a401c3d28366336c3b1d372af93010081efe7db1cd2c3a39e
-
Filesize
6KB
MD5a5f0b7132593a07ab38b9652b30abb27
SHA175f57e09720d0cca7797f8d5bbaabc57e83c067d
SHA25631a8632e1c7785fd8de958997a237154c0f06eb1d3cb96dcd0af9126aa0e8516
SHA5126433c0110ba1877036930fe92f1c307468513ebe27debc5acb57b0b8e9002e5debca8058fd0d53f9845ab7183fb610f054272e7f1e2e60c1eec41c0e5a90f32e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52f7872fd77b4a43a42455f610cbe84ad
SHA11f2c8994476a62339eeab90e9b4435584608aa87
SHA25617f7a741659644fcc45cf3de97a8741f7feeea145713682a761a716580a3a5be
SHA5126618fcab0736d130524009ff350dbaad76034770f51267fa051c8b48a93a1fa8918d1fdfaa31b0e1efc3c0db9db41df7a299ce6fef614bb452b0900dd47ef399