Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
78764958afcff89d6e274e23348510ce_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78764958afcff89d6e274e23348510ce_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
78764958afcff89d6e274e23348510ce_JaffaCakes118.html
-
Size
20KB
-
MD5
78764958afcff89d6e274e23348510ce
-
SHA1
98cf943c495d7ef987a42459e5bd06fbc69b937a
-
SHA256
c0e996b829d05067ef5c02b4f7e912b931e6701136d3902189a96efd89dcbde8
-
SHA512
5eb5f3af75660d827a65da042812d4cf352c55fb10fe227fcc251ce3563ff2b1005933646dfac5f90ffdcc03f0ccae84f1bc47bba6fe50f1522c516ae60fa2e6
-
SSDEEP
384:Ku68K6o0lAtsdgCKNqX1PITHZH4l30q9tFI8L:FlMgpAkPL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 976 identity_helper.exe 976 identity_helper.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1480 2584 msedge.exe 83 PID 2584 wrote to memory of 1480 2584 msedge.exe 83 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 772 2584 msedge.exe 84 PID 2584 wrote to memory of 2068 2584 msedge.exe 85 PID 2584 wrote to memory of 2068 2584 msedge.exe 85 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86 PID 2584 wrote to memory of 4448 2584 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78764958afcff89d6e274e23348510ce_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1cc546f8,0x7ffc1cc54708,0x7ffc1cc547182⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6528 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1836 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6578057496180059202,18078271466703751187,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5b165e13b8b8df2347b27e4e2ef79d6de
SHA177be48ea498354835aa3adba3715e1bbd5581d17
SHA2561401c80a6cfed37807173b89efa0978dfe1de388d481712532bd47734a3912c9
SHA51226df3588473d719051985c37c3dfd4f6c0ca5f5ae21536f4278df11fcd55a7755fa89c2017630d5b8669832ccd0bfacde3a748b39ad801be574757f9ad3e5657
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD56df93bd1e16b6a035d220ab51351e82d
SHA18823ea4186fccb4029b0413b09e55888a1c85d26
SHA25676de638dccd0d2e57405ecc86a9b851146a94577c6ee33cf1e04ba3a61660b2c
SHA5127ce725ffd0241fde60fb3001f484d2e9ca315f8479f07e92c8080b6076eb549ab60b562b951e513f1e3158a48464695473bc0c4d1947b970ffbe1cc67a23dc7d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
612B
MD5db1397ed626543fd2a061e9c377c6723
SHA1171f4e080af819ce6e050716737f41d7f1929df4
SHA256720a0a24266655285cc1b561851c31ce2235a126814de3b7dee1b1ce5797cda8
SHA5128d1740f5bc7d09e0da679648844d6df674a5a938f59166a772ff163c93d5ad5609a369276b9478af025428089fc1a2a3555ac6ee439d6897db64c3aed78c9e16
-
Filesize
5KB
MD50d1d51ee88a73a2790937eb013076068
SHA1e062dec64515d21ee47fb729cc373798b67b6b4c
SHA25666d3f0f478dac17a296ebc8a3c13a80e88765ae081de1f43c136b5e7cde5483f
SHA51295249c2be753b39cbc777c63ec4cfb88f9a9db7d755f606930a99a495f067d8263da4364cbdca3634852085147ea5f70eea3cabad89f579f6b96c51c86383eae
-
Filesize
6KB
MD5ba05443c6e3f3fdfa077be62350e09d1
SHA109a0094ee95fe2a31c3337627dac8a6d34e73254
SHA256f412b80b9a22399053ed41651e8ed4f99132a98b11fc96abe5cbc0d743a1162a
SHA5121768fc1631afd5ae6c5d146a281f41227c8b72292c184a40a44efc042c61484f21671f67424998bafb5e3c8586ecab8fcd589eeb6ff36e6858130979f7df9e37
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5454b43b9a4b7ba4f8261f16c7d75fc62
SHA1309382d6114bb10320dd89e9edaca02d670fb708
SHA256d051ce9022cd2c703a9649a479186721ddb665d245ab2d304d3bb85108ee7f2f
SHA512225b89e9613600d6f1dded1da054873e96b08c3b877fcb712e9d16f63893ca34375ba46af97330891dc572a51901257d1bb97cbf3c801ced9ee4cd1833503724