Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 05:27
Static task
static1
Behavioral task
behavioral1
Sample
44b61e4eaab8cef8a76c71fec046c301_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
44b61e4eaab8cef8a76c71fec046c301_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
44b61e4eaab8cef8a76c71fec046c301_JaffaCakes118.html
-
Size
123KB
-
MD5
44b61e4eaab8cef8a76c71fec046c301
-
SHA1
41285972fae33f8998f5b938131f1a910380c18f
-
SHA256
0357991c618e78bf2149d6a42e11c97ef9a5357cabb4fa8bbb46904a6244b862
-
SHA512
12a6cdbf63891c896d80fe42b9f326d88deda7d957fa28c2e2b0311aff5fe359860ba894b7646397ee6c038ecdcd96cfa2639445c99501e78e3b0a8e3ea50bee
-
SSDEEP
1536:UUaIkdF1yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:UUabdyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 2800 msedge.exe 2800 msedge.exe 4324 identity_helper.exe 4324 identity_helper.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 5096 2800 msedge.exe 83 PID 2800 wrote to memory of 5096 2800 msedge.exe 83 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 3360 2800 msedge.exe 84 PID 2800 wrote to memory of 4952 2800 msedge.exe 85 PID 2800 wrote to memory of 4952 2800 msedge.exe 85 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86 PID 2800 wrote to memory of 4912 2800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44b61e4eaab8cef8a76c71fec046c301_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed0d246f8,0x7ffed0d24708,0x7ffed0d247182⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,417784003947221342,14642587744571399837,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD563c62ab0e23374036db56bf456bd9b1d
SHA1bec02db2e3446c51923c34a492130e578194e21a
SHA256611bbdb664fb63bc0f28f2824780af990b1bbfc42ac132875fcbb075a0f9db1d
SHA512efbf1e701a0ed4c2167a824a03036dd0c24fccd52afa7a28e1c5d7ae6c2e98d38115b723be1bbaa7c77c06d389e9dc6d0671f08117609ea89e2a284a2e68d97c
-
Filesize
184B
MD54c38f2fd54a484417a99bede8998284d
SHA168a6030ff610a14ad7f49295cbd40c9d873457f7
SHA2560571f843a17b850c94b3016762132e428f4e72bc69e1f0ded31164c6028e2bbf
SHA5128b1f24f8fa6a88c8de97ff842e8540e259d72cfd8455deae0636ad889b3b5d62566dbc4d8fe6c8f58d7f4ede0de27371d938b2342f64cfd8fcce0db05cefe4f9
-
Filesize
6KB
MD5185843e864f11cc3c4070e655a367fa7
SHA18fb919064bc9d0489fc82b16d7b4704f544e9041
SHA2565b2e22bdc4d3b6c2cc5a94039b35f9691f9ae702e83f0b05e0cdb1421dffa9ea
SHA512265df698c9aaf9cf29232942e9d7d723a3d7a567bac22d299493ec813883f4147c73c4a56fab924b64a9904de5fd111034f0eb1115c46939a2b8b0d43c7df81c
-
Filesize
5KB
MD5cd617ddb185aa76b64261e2994eddfdb
SHA1133a9b155871c1a13b992d02245820184a7dc2e9
SHA256df644a6f581bbf2cfc05f7baadb7675d15238f4364316bf204fd904d476f001f
SHA512aa273e4be0b9bb1d2610ff8608e45fdaa3fcf2fff1cb98d69b915cf29d19f36c322be10d76cfafef7dc5ca3d2037d61d6fa8e32137d1419c686e7a82d539c23e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c54d2a2000e5d265185abd2371d93fbc
SHA1717fb884b2b93dd3de189db7f24ee30edfcac3aa
SHA256c7eddd8c8dbfd008202e5d2b56b71006bd95f3307ff68cd69f3b7c5835c9ddf9
SHA51238e4a12468da701b971503db92239a5ed7d66ac54cb0dbc3e8c66368972278ec476f7d7f7a84d1487a09d6a0b9c788f5bb8d0dabdb8ea64967fdff9c319fbc28