Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
44b498126eda3ac0e4001a78bcb38c1c_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
44b498126eda3ac0e4001a78bcb38c1c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
44b498126eda3ac0e4001a78bcb38c1c_JaffaCakes118.html
-
Size
24KB
-
MD5
44b498126eda3ac0e4001a78bcb38c1c
-
SHA1
1cf2987d3764f69a4f5692309af46051cb5d8c41
-
SHA256
1de7169e7f6be2c39dfb537f8d2f256b52920aba8a0ef091bac37ea0a57231b8
-
SHA512
772f3b40df54cf4a494b2a99d81bc9f16ecf99384979623ed5b57a58e5c3ad6871d904c877bbb553b815063d0d6c5cdb1e3b1f864a3202ea3d4993702605836d
-
SSDEEP
384:S1lTQD8+eGJBtSnMEvfwJHse6Hc7iDqD6V7meNXTe3j6GXBrFlrIOTo8150yiT:SfTQD/XuMg42M+DqDomQILL5v0yiT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 1468 msedge.exe 1468 msedge.exe 2552 identity_helper.exe 2552 identity_helper.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 3112 1468 msedge.exe 82 PID 1468 wrote to memory of 3112 1468 msedge.exe 82 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 1624 1468 msedge.exe 84 PID 1468 wrote to memory of 3276 1468 msedge.exe 85 PID 1468 wrote to memory of 3276 1468 msedge.exe 85 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86 PID 1468 wrote to memory of 4016 1468 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44b498126eda3ac0e4001a78bcb38c1c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe410b46f8,0x7ffe410b4708,0x7ffe410b47182⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,8810090384808590954,9271072801903203213,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
259B
MD50925cce19d681d519008e04bbc91ed06
SHA1c8b542ed9d3b84f72eb2c00be268ba2d217c9ea3
SHA256eb7494ef76e523372c22aab317d87442d5eb37013db65fc86e9a4332947d323d
SHA512e8e002b1cca1cefe27312bfabd8437db63e3eadef428e37746710e1a33cf6d9b2694eae508ac8b77b404a2c2d92caed8b321da0bb8e40b3691b0336a856306c2
-
Filesize
6KB
MD5accd16c30f7b80cfe34af69f3acc4dcd
SHA16bddd6aff8ba6724d6ccae57a4973b48d18ea522
SHA256c008619586cbf0dd94b4cb2cd66cda7955b13f317d1561125065b62f42882719
SHA51285645259c0ecdac2c2181e73173ee2e9f107abfd89f54dccc7030c503d02303a7caa872e47660a03b81c51cb207b9ddaabc11923fb93c2639f46cf5e3a1bb5cc
-
Filesize
6KB
MD510df0ec9fd7dc765759d2d4c3dfac56c
SHA1afeaa23612017dce33d47de23e6008256a00df29
SHA256ad3969ba07be502749ceb5f4c977cacf358f9f3bb7600807a61f274b447bbbd3
SHA5120eba594746365ef6cd047f751cacba52c59b49e27a241224f1dc69dd40234d15d43098d26ca417a0acf789473359c13bfebe5758769f58d8bcdefa3c793dd3e0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f269b3048661def37ebde2274e2d4a80
SHA1dbdef89f24e5f2fdb02612c8a0ce7ac4efdb7fbb
SHA256735aed5e8bb71ff99400a1134695e8d6427a209c98d4bd5d95b2c8e8a941abdb
SHA512f21992d0c34348f2133be8e69f9cc10118a4a3a36bbd3507edd472928112215d2082889d93864314a8b0515de55df057d8b8e50c7f09d491216a78004813e074