Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
78bfff976d26c877f2556be39a700ac1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78bfff976d26c877f2556be39a700ac1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
78bfff976d26c877f2556be39a700ac1_JaffaCakes118.html
-
Size
95B
-
MD5
78bfff976d26c877f2556be39a700ac1
-
SHA1
8e078445c9f314e414916be24bea8bdc64f01981
-
SHA256
e5aff8a704f0b7f1f1919cedd896b6b02162f3fbf7828439afdc72b899fecfba
-
SHA512
200b2f5059c4fa764bdbd170d39b9c0140c800b23bf8317e29fd1aa6702b514d385d4411f5d431fe8f6d8a2fde5d28dd5688e667e168a34737ab315fa5715815
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 5072 msedge.exe 5072 msedge.exe 1692 identity_helper.exe 1692 identity_helper.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2984 5072 msedge.exe 84 PID 5072 wrote to memory of 2984 5072 msedge.exe 84 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 4552 5072 msedge.exe 87 PID 5072 wrote to memory of 3416 5072 msedge.exe 88 PID 5072 wrote to memory of 3416 5072 msedge.exe 88 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89 PID 5072 wrote to memory of 4420 5072 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78bfff976d26c877f2556be39a700ac1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc274b46f8,0x7ffc274b4708,0x7ffc274b47182⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1351345438629578013,10774228404221521890,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:940
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv YUYPbgPC+0urHUu+Sa5Wbw.0.21⤵PID:3704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
5KB
MD50632f6d2c101d1c807ec5bdc1b5e6cb6
SHA14c396c16f1c9ccd09b2e345485ccd4fd9134520c
SHA256b9fb4a61db709b768f4ede1a0c814616b7803a90810e4eacc93002eb3e448c55
SHA5120296fb91eb70c19a6786048df6639f752cee6e5f3bec2f4e3f93f1624f8c67ed5fef6266ac1614910a6b7e04cc0e2e1807d39ed968a9c5e94413d23493b5872d
-
Filesize
6KB
MD5241a3ce20935fe614b0718895865c691
SHA1c45ff023be7799d74755d2fb2dfb6b588d7dcbf1
SHA2565877eb3901b4017a815d0231112c55804438bb68e8533fc1444b7f0a10403381
SHA512afb4e7b9b15bf1f3dc5fe5488642472b1763525de7ace29fc149c6fb2da0c0a1bb710e33368b3bc6720f54008effbf510e314c2ad8c235bf94551810eb0fc92d
-
Filesize
6KB
MD5ed8270be017f211f2990fbbf52301d25
SHA12928a3d3dba283c6d9e812be291bb258d188e904
SHA256c103c7c88918fff0ad6194fee9a50dea88ecfb6d355c1fb4da3638dadf9935af
SHA512afc8c00ed784a8fd68a0539a00b2e4b2e5f7917c90390b1bdc69ffb4fed4981f952d95f172afc855c26c8f94d0d60a7894b44bbef8119d8c242c7002bb26d26f
-
Filesize
6KB
MD5add03009d0ec58f00aaeb469b48e8dbd
SHA10b8919a26a454a2d9b5ca71dfd9ffb45ae205457
SHA256d7be263eddaf6f263609540f1756a883ccc3e575f9a9d9a2151caa728405c664
SHA512502843b516af0ec230ba6828abc9e8e43e3191d6b46a53f9d6ce291cea1d4bc0b9c17248f319a4454e96e40125c76f9c572c5ea2826f2cda1cdab8e821e6f196
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54ac960b6f59c5f856ebff42fa9cec283
SHA189c9e941f60224607b7bd875c3c3d647727f1cb9
SHA2561a8c55703b6c230f85d4c6c9c669faec60d180daca687677394b6d8c9bccd65e
SHA51256d8df0b5682614c086668224cc91f8888b5b7b490799d5df3f07038c92d833cca7cfc959d289268d9c9450a457a2bd1519b62be2ae2b9d7eb9331f248a6e973