Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
9c78fb3037fa1c56932c91089f9a9803_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9c78fb3037fa1c56932c91089f9a9803_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9c78fb3037fa1c56932c91089f9a9803_JaffaCakes118.html
-
Size
214KB
-
MD5
9c78fb3037fa1c56932c91089f9a9803
-
SHA1
11332e5214d75c2d9631bfa12a36eec36e7e5228
-
SHA256
6b9c40550607857d82b93c1822d38583d9fef4381ff79cd2859352e264167780
-
SHA512
19911e9b9c0a33285050b9250e3ec8853cfe5b31f0f9c402eeac782228cea744a15173722064aeb5f1bd1c4f668a5ea81fd7a824988a2e5595ee917f00709fd8
-
SSDEEP
3072:8rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJf:kz9VxLY7iAVLTBQJlf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 2416 msedge.exe 2416 msedge.exe 1724 identity_helper.exe 1724 identity_helper.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 3916 2416 msedge.exe 80 PID 2416 wrote to memory of 3916 2416 msedge.exe 80 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 2692 2416 msedge.exe 81 PID 2416 wrote to memory of 1328 2416 msedge.exe 82 PID 2416 wrote to memory of 1328 2416 msedge.exe 82 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83 PID 2416 wrote to memory of 3140 2416 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9c78fb3037fa1c56932c91089f9a9803_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0f1e46f8,0x7ffa0f1e4708,0x7ffa0f1e47182⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,6938282334873152669,3995639808422706556,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5dab90e849ef3b9bb6ff72b195ddb7b38
SHA119ec02b28199df634e3740ef0df4868f903ad3d4
SHA25668baa6ac0917ed78a95f0856327eb7299044bc4fab62e80394cc31f39c64f9b9
SHA5129234dd4434e6dbb3dd8e0ff8cf9e065fe3480ee2fb2fd692ebcd24742916eb065e927e74ea66a377d3cd60b3474d49c099c63f2295c858896aa3e3ec91c6d935
-
Filesize
6KB
MD5325f1ff796eed3651064621e8afd0584
SHA12737060fcecfcfda452402db08d0a2b6b70894fd
SHA256f8e24289f128c64de1bce4e6ac348d7c82e4c389230f93ba15e7f1dbc752760b
SHA5128725cf0a2853a2c172172d2fb9aff27bb018d56595181438770719ae145983ea649c9d2aa36327b5768eeb68225f505d41261fce1037d9689d153407fbc5d38f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5e4fa3117a5dbbc84d8566e8656110647
SHA1dcd949b7d43a9642cdc8fb18800f170b98a09fe1
SHA2569f5e26e358fa3966508656a80552acc88e0cdf019dd0cad8696a9cd8b716485c
SHA5127ab568f6bf4ef3311d0c26f118cff7af8876d13c0dc4c3dd3773c37c51cbfe7eb75fc98067bbdd58b0cabfe0f1b2dd77f901ef0f1c93aa55388c183cf8dbbd1f