Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
44dd499bd7078c484cbdd7c287854266_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44dd499bd7078c484cbdd7c287854266_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
44dd499bd7078c484cbdd7c287854266_JaffaCakes118.html
-
Size
54KB
-
MD5
44dd499bd7078c484cbdd7c287854266
-
SHA1
cee50b443e680a7c306b9e4b56971f6eaf2e6e02
-
SHA256
6665a6d16fc737999a43f03d37540f068ede9a051fd3f1b1db16d36bdbe31b92
-
SHA512
ee4b08e09cd3b66c74f47b759a930ccff7a997541255d3e28620dbac585283786e4943b9284f5ef6e6b33dd6e4ddd69065ee151a7747d0726dacf1af191a7089
-
SSDEEP
1536:iGR+eWGr7Yzj+rfb2LT6+HR3Pe6ZLWyB7B:iGR+eWGr7Yzj+rfb2LlfegLRB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 3836 identity_helper.exe 3836 identity_helper.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 4280 1148 msedge.exe 83 PID 1148 wrote to memory of 4280 1148 msedge.exe 83 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 1700 1148 msedge.exe 85 PID 1148 wrote to memory of 2000 1148 msedge.exe 86 PID 1148 wrote to memory of 2000 1148 msedge.exe 86 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87 PID 1148 wrote to memory of 1936 1148 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44dd499bd7078c484cbdd7c287854266_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8daf946f8,0x7ff8daf94708,0x7ff8daf947182⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2320 /prefetch:22⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3884 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,18375155530398560082,14441076937002874975,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD506a3482bbc6428a91ea338b6842f1ee9
SHA1b3ebf0476898bfa828a82c1599d54d6e3b480171
SHA2561de4ac9ef36cf6c4f91fc8d16f2e03b277d55c5bb113ac041e69247b19d37af8
SHA512dbe49fd9d2bcbd132c6e8efd8ce6e69015a7cfe28961fed90ab522675b6a787de028340f851cc37c8de7c8bdf9ab315e08c2fb5c2ccdda7b9cd15d11df490c99
-
Filesize
6KB
MD570fa71a2c50afbfd6da2a8d88598bea3
SHA1f1a1b9c7ecb6e4693a188d5ac3bde9ca98617462
SHA2563671d3b2ef3d07dc08f2f68d92c6ace0c170900227e38d433e071dcd8b8d9172
SHA51207e48546791006ffa8c621e0093614bcd1f81a0b42e401dc51d3b7edd4a4229218414cb07ebc0ef77b7e0df1c31e299dfc390eca4c1a45a858d24d25867e5d88
-
Filesize
6KB
MD5ff102c506c64879cdc19a1dbf1b69f8a
SHA1ad4f4331e34274c0213cb5cdd1f6dba1d858d74d
SHA256cc182e2755ebcc55b9581b68e8300887b2626de9b724fa6f9effaa19f23e08a8
SHA51205c2c1d1f901bb7ff5a7d2cee65c7a2c4688c5011da96455659eb730697846658e123d973c7ffb6b5fc54c6e75e84e43a468c46793b3da8c0681a6ed2b66e016
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53693415a35444b99cb409ca7ab5e3d9c
SHA12aca9a75f2d68e99c1aae6f48d55b6445697f94c
SHA2560b680082bb971c7eb4b03477771331d8fece9220be8780a33a99165e84f66668
SHA512be53d6122c4b288d9f2f13f6982670c43c21bb07f9a33ed524ee3dd76d83a382a1f7d5a21664d1fe00d50e5b92aea0a2bb8d785e19b7de811aa7cef6ad40c0c8