Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
44f0389f75f12ca5ab0607c47512f95e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
44f0389f75f12ca5ab0607c47512f95e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
44f0389f75f12ca5ab0607c47512f95e_JaffaCakes118.html
-
Size
81KB
-
MD5
44f0389f75f12ca5ab0607c47512f95e
-
SHA1
dda1d9d7f41e357cf5a267ee0f24a71f33baa0d9
-
SHA256
9824d300a184dcbd1ee62a539fd8161bd7c37b1b35050ae5f996c9ebda015373
-
SHA512
ff7431e241d0672ce5ac968cf873b076bdc44070f50c2dd6289b4eaef66ca608a980d30be31eb2de378e1599716724a53aec0150509a69b440d752628da4e908
-
SSDEEP
768:Vuc6IsLVwpBUANb9zzyMZ0Lau742fyHCeg+h+JoNg6sTkAtFQpCYbK/NFJetV+hP:gBwpBo+AoAQ2NFU3+1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 3068 msedge.exe 3068 msedge.exe 1352 identity_helper.exe 1352 identity_helper.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4192 3068 msedge.exe 81 PID 3068 wrote to memory of 4192 3068 msedge.exe 81 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 3220 3068 msedge.exe 82 PID 3068 wrote to memory of 2848 3068 msedge.exe 83 PID 3068 wrote to memory of 2848 3068 msedge.exe 83 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84 PID 3068 wrote to memory of 4608 3068 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44f0389f75f12ca5ab0607c47512f95e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb2d46f8,0x7ffedb2d4708,0x7ffedb2d47182⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,12704030992454627096,9671520183805221410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
807B
MD5043f95f4cf127021659cea31557f9ae5
SHA1ead03dc772e7a0cea39d664c8846bd32f19a9f94
SHA256b0cf6b8312a7c5792829bbac404424441d8ec18a3b780a021a898480f7ff8d8f
SHA512e64ace7e47265f2bad81ee62c834b2040678988608b1c506562146492bf88c772b751154753abe6ac84e60ab90710c562bc746ae9c3599f7848ed0bd75ebd454
-
Filesize
6KB
MD5481b628b123a91516a7a8aa6521e18fd
SHA1460c2f2900241fd8aaddeaf232304b7b5354611c
SHA256f0820dbb121d28ddffec6196e2f017976cd90203de95cc7ae36e2973d5d76401
SHA512d6ab09261aa474aff6d1ffe84e285ab155b6ea0514ff400b0546c31253a4c1e5b5f21c4eb170fbb40dfcbc7180bd3f25359854bb861e5635cf28ef2214fd2216
-
Filesize
6KB
MD51437cf4993abc7ded0951f77780d7724
SHA13d7aa5f7424f2e35c421e5dc11ea8c29288f5778
SHA25681495990b945598dea01d0d5232ecdc771b69d02990cbad81cbe84f7511bb9e0
SHA512996679a03f0b86be6d082e41283ec6f1bf46ea24060703a1612608d87fa2e86ac5904d62c26c8150799f0076ce6135a9cb28f12682f01903b8fc574bace1e7a4
-
Filesize
6KB
MD5e2d9c31b4300be60361d06e0421a6551
SHA15807eb3f52b4ab6f8dbbce21a966f785260e39c9
SHA2568c77c233b5b5eb11a7f299b4fd13652ed556ccc94dce89bdc2be27a118dd9dd1
SHA512cd3963bbb9a7302c6fb0551e519eb9bb228b23f735206796e121f90ec01f657572ecba94529fa4a68591192307ec353638d0afc9de0ad89d434eb769d5b7de0e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d1dea83d510c28c1c10a3506dcdd0e28
SHA13502f7d72d65fac5a521386009260ecd78105f60
SHA25619842028cb03659c9ac77994848558fd521ffd1c31cfcd722fd76837d5e2dd52
SHA512936992c08bf9addeb8c4055edf7f967551e1e5f21a18db82ff9e1db832dd721bb41f1ce35fbc2bdf2636a36aad2136b54c7d45ca68fc5488d8ab9970d3d88905