Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
44499ad60771277fb338afbcc2fad51d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44499ad60771277fb338afbcc2fad51d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
44499ad60771277fb338afbcc2fad51d_JaffaCakes118.html
-
Size
172KB
-
MD5
44499ad60771277fb338afbcc2fad51d
-
SHA1
f1e6b6e94a961c1c611b1141ae878c4f9dda0a41
-
SHA256
f65ad7d8a1b015a4834ad23b52379174a9e5721d5f95c5de944218b317fc9bb7
-
SHA512
7efc3f4042e53aca80165afe597dfcee0bb411afcac63b30c22b6a7d3ecc1a16bf3673d027b6ab47752a38f37444f36f44d2c76506f1aab61547df5b2167b386
-
SSDEEP
3072:Sq5+kivQq35K0WDdUtcvjHVAuw0JWCSWRtB47TiBMOTudckQcYBCN22jE/yfkMYc:SqnivQq35K0WDdUtcvjHVAuw0JWCSWRG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2952 msedge.exe 2952 msedge.exe 3560 msedge.exe 3560 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3560 wrote to memory of 4392 3560 msedge.exe 82 PID 3560 wrote to memory of 4392 3560 msedge.exe 82 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 4188 3560 msedge.exe 84 PID 3560 wrote to memory of 2952 3560 msedge.exe 85 PID 3560 wrote to memory of 2952 3560 msedge.exe 85 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86 PID 3560 wrote to memory of 1032 3560 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44499ad60771277fb338afbcc2fad51d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c15146f8,0x7ff8c1514708,0x7ff8c15147182⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,15815911369289716252,8405748856262156915,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,15815911369289716252,8405748856262156915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,15815911369289716252,8405748856262156915,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,15815911369289716252,8405748856262156915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,15815911369289716252,8405748856262156915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,15815911369289716252,8405748856262156915,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5aa1c7266d8420d57d4950c2026a8ad2f
SHA1ff14b783d21341f8caae8cb73c62708e3a877ecf
SHA256da43166c3d1a13d25d3dfe1b17f547dceb0484593038b4ffc77d312f1b159ad7
SHA5125932c3bea79454fc3e10001f317aa02daff79abbb39f03bff5969ba87ab0832c1a1f43e0054ac56d5aeb540429be3cf7bd105962505992c65454064468cf1f25
-
Filesize
6KB
MD5f4ccd6e5b2d947b11fdc40763e247df5
SHA15dd32e8f8369dc2ac76080ad48126e00c431ebe9
SHA2565ac94591841d72a39d92f9fbde598c6d94dcb08642b6c63723582e536bc648e1
SHA5127523427da8586543b79ad702fe42ac9906e835f212f6ecf14dd8ce804d9367a4be844755a4d804751b2181938a8d005f44bef2b83320a72d5c95b06c48852ab8
-
Filesize
11KB
MD5ca598d9bbf19dec1b793af6339f1a4f0
SHA1c0ae5ee98a21dad5307bfade4324b7dae1d558be
SHA2561257ae6d407ad6ea42d64d469ff1660e3e07612a977cbc7271eb4f559900fff0
SHA51232bdaf8296dff4673f4f3ee3d7fe551efd1955fe581bc5fc69f0a85df44c90a56030caf0b99e192ac4dcccd6e3d47f901e35295e04bf525dd0962f9de03ce8b1