Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
478a6d47696ccd54f2b4593dce2830c5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
478a6d47696ccd54f2b4593dce2830c5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
478a6d47696ccd54f2b4593dce2830c5_JaffaCakes118.html
-
Size
2KB
-
MD5
478a6d47696ccd54f2b4593dce2830c5
-
SHA1
4dbab3d19c86d7bee4b274cfcff45830240ce2f3
-
SHA256
3fed41bf7fc43621bc26eafb17e83054e49a69fd3728dbf7a5f144c721c2a8d6
-
SHA512
9e0488d08a8365699c79d62b75c81b1cd6ead42710a8e22668ca0a9440302ec96635b733cde6cb5137e32f3c0745b130a3ae3ba3d0df3340db25b973c6ef9ff0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 880 msedge.exe 880 msedge.exe 3324 identity_helper.exe 3324 identity_helper.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 5088 880 msedge.exe 83 PID 880 wrote to memory of 5088 880 msedge.exe 83 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 4612 880 msedge.exe 84 PID 880 wrote to memory of 2728 880 msedge.exe 85 PID 880 wrote to memory of 2728 880 msedge.exe 85 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86 PID 880 wrote to memory of 4072 880 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\478a6d47696ccd54f2b4593dce2830c5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93aa346f8,0x7ff93aa34708,0x7ff93aa347182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3628 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,9308173081835182038,14128069317335499234,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
6KB
MD50f41d362020b47f9f9871fd0473ed7bb
SHA196fa31842b3ce0b838cf029cf1f6898b08b2d693
SHA2561200a67c66bbec3bb2052283f4acb30405ba1bc89fa377751307738a3ad0cd0d
SHA5129a10b3922b120f8750a2bd92dcd164cc221fec20774fc44e64ac04eaf5efcbee941f4f8429d7276cd960574bfa106a3b837da822c952767cad4c96909b6c5744
-
Filesize
6KB
MD5862c820f226e4b7239a675445bad51c8
SHA144a0c0a4baa35b1256b2d327b86f4d0233761312
SHA256753fc708674f8019fa9d941cd9fa986391a56269d06902675533ad3c3bc6486b
SHA512228fb7f8160f064ec69a8cd480f89d190ba8e298fd4eb33e7a93447acddbb1ef1263fe3b6c10ac8b5bca57fee473624901a7870b93994fbab5e90721098f883e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54195450b37463bb75a7cac074ce5e709
SHA12e416af3daa660d2aa56d830fa171055af3e3e6f
SHA2567f1489dca851d26d2668896fa2c573410454bd92b4fa6f7f689074f9d5ef3eab
SHA51278249e459fcaa49a59f17c2cefdde170e3c253d76847a5d30377fd3b998a24a2ea381895e10405a1e11e2617c6ce41ff789b4b8e21fbc41fbd169ffa27f3825b