Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 04:22
Static task
static1
Behavioral task
behavioral1
Sample
44839cc811e7f41996cb4324e7574c44_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
44839cc811e7f41996cb4324e7574c44_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
44839cc811e7f41996cb4324e7574c44_JaffaCakes118.html
-
Size
19KB
-
MD5
44839cc811e7f41996cb4324e7574c44
-
SHA1
bedb38e1c2cbd376a654b210937ca0e02132a338
-
SHA256
bab2abec69e3821209d9f93ec397cd9968dd0eb74a9d98bdf110b4900aaff3da
-
SHA512
e8aab6eb79656ce9fac05b70e6b37f017ba1e1c0328be02693d7b0f0a85e02d93308189026723dd21d6f6982778f96110f6e58d346e68b8df7948b4952dfa8b1
-
SSDEEP
192:9K/y7UhrIiqEWIaLTgE9d3+ScXGSuMfljQ5YghDGScMlUx9V6cxjb79DXSWiFpiC:4/yWrIiRaLXf+gBAQ5Lahp55iWibiC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 3380 msedge.exe 3380 msedge.exe 936 identity_helper.exe 936 identity_helper.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 1092 3380 msedge.exe 82 PID 3380 wrote to memory of 1092 3380 msedge.exe 82 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4800 3380 msedge.exe 83 PID 3380 wrote to memory of 4536 3380 msedge.exe 84 PID 3380 wrote to memory of 4536 3380 msedge.exe 84 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85 PID 3380 wrote to memory of 3692 3380 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44839cc811e7f41996cb4324e7574c44_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc002046f8,0x7ffc00204708,0x7ffc002047182⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16602905311284495204,8206359655693658718,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
1KB
MD5d8c74e8ef45e4f0c27f2f65b7ce927a1
SHA184e1bd6d3e758bc67e68bc91a3873da346d8c8f8
SHA256a3cc27f6c0b3c9f63b4f021528b6041c3ce10078c4cc56bce01b90f80a3f9319
SHA5128a573da2a608201bbadade16cf922dcf8a2f3da88062eaa7ecf6595f0daecf6218947ba5ee233246019c1066ab2b9e8f45c5d2d9395c6f417fc16624fa8be18d
-
Filesize
6KB
MD575fa11d0d86d74c6b66df964f1ce09b0
SHA178c238ed59bf1b6087abd082b2c399212330f89d
SHA256d9dbec2335cef29bdaa13beaf961384f4d69253528ca3d600bd33309334682e2
SHA5122de49edbbfbdeca6f206519b10ec082832a51e648ab57b2de8c9d34acdab065fbc5ea6685980568f9ee928a8e7c0de9dfa275dd7a17c76ee7a0e740eccba8211
-
Filesize
6KB
MD5ace532b57f3ae8f1b1aa666a13e9f370
SHA1082f1579b1a6271e384d3dc58537a21303f2ab8a
SHA2565ad7a7bb2355e09afef3f2c635b27410b886e1a8bff3a35a8855745f9b5f86b9
SHA512a2167756e0539eec22cd5c4aef2bbd8d93eb1a332f64d9c345e48327bedaf3cec0eeaa43e15158422d360699fef443bcd776ca4f3ca844eeeec12d9351c3076b
-
Filesize
6KB
MD5479633f09a11d55f220dbb4318cab346
SHA1e8d860f86d481f4a4a5b4b539ebf32ae9bf6b885
SHA256b9023af9d5cdf81fd5cb0c1da0e4d7a61a3731efa7569c6eb12963b8bc5cc64d
SHA512110969da221055c2ed264778644c72fb694187be1eda8d921d5763f92025bc118e974acdf670011ae3497cfd254a8b145a0ec34cfdfe0313389cda16fb92c8d8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5f5f6a48b29c849607e49a2c550da2728
SHA175cc5e45491024553bcabea9a58f2f883f78a3b5
SHA256ab00ff1676c143d01d08f68669b6014cbd89f4db6766577ffb271b4f328192fc
SHA51244f63e61bccdd418e8246968a15d222fecaa2581ed537c05f9ad959d230d2c778b5dc7560bc327d6adb03a1d045635d89c3b1a9679fabd34b297df314347ebe0