Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
44a4731597552a387d73f657b5cd089e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44a4731597552a387d73f657b5cd089e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
44a4731597552a387d73f657b5cd089e_JaffaCakes118.html
-
Size
15KB
-
MD5
44a4731597552a387d73f657b5cd089e
-
SHA1
00c04bf8ce4ca23622599c6ea790ba80146a602b
-
SHA256
219e436a8d1977b4ad0923feb4df59b23aa3e9ddb4ff6b57c64b29fd2d701fce
-
SHA512
18867668f5d788d29f0b3daaafb15f344df47257533b4cd5a9189d26204726024604614d476c6a063c2d526083fd7eb238e14292686d8d906dd8aae7366429de
-
SSDEEP
384:J50rDhcTGIGa8V7Y5jNe+ZqJuUx8rJMXan+Q+5:JYDQaJY5Ipgw8N/n+R5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 3984 msedge.exe 3984 msedge.exe 3496 identity_helper.exe 3496 identity_helper.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3608 3984 msedge.exe 83 PID 3984 wrote to memory of 3608 3984 msedge.exe 83 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2124 3984 msedge.exe 84 PID 3984 wrote to memory of 2896 3984 msedge.exe 85 PID 3984 wrote to memory of 2896 3984 msedge.exe 85 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86 PID 3984 wrote to memory of 4432 3984 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44a4731597552a387d73f657b5cd089e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd706846f8,0x7ffd70684708,0x7ffd706847182⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,11672175820732268083,6611898173078735053,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD501008137ed5db5f669e8ee2406f4ad5d
SHA1f355a789978026b56b52ff55050437f75b8ed498
SHA256dd9ceef82ccf87c268cbfdf6f4e4243b5859b64255dee071d4597765bcbd291c
SHA512d1bd4c3cf1094c46980e3f94898be7485c2441d9e4a2bfc7f21577099a7b56c27b4204ce4134a6f640fe4cc5aac4eb6bc9850a261475381b6e5ae64f2badc4db
-
Filesize
1KB
MD5182460a136a14d584557c6e7bcdfa2c0
SHA1ae1216bda16504a54299d1e5e29eaa66d63fbede
SHA2564994d0d00b87fcf3748fbadbdd727011fc1b38d5285fe4fbc703f7ef252d9e68
SHA512a156c32c5c5ba4460c0632a228233f5381b68bc8d35db3a4c4ec04645c3f3f0d6af85242ac88cbf72d8d428f678e7d58727238083fa3533a312b8fc69c0f6c37
-
Filesize
6KB
MD56c403dcb808421ed8145d3525fdc4087
SHA1faf88c9dd2246152b339ededd04e82abd3b31d47
SHA256bfa744e19f780c230e0c854ec1d73ef21b5d18a46aca4744438472acc4efa585
SHA5126280ae00df110ae2eaf1f557034bf1a65874b11b11d74c2b6e59549ef4dfc99c9de762cf9e316d5c6d80b2808fa4976bd61f61cfef38be76b51671d6c296590d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d1145285-228f-402a-a8e8-42c4d1e8db03.tmp
Filesize6KB
MD544d09a4a15385b4d84743ddfc4c216a5
SHA1001fb72ec9cc0d38a8fb0591d9b245f2d3b196e6
SHA256116ec85562cc16fdb036eb3c4dc22a3b243ef463a78ed86103b6df857c3ac9ae
SHA512454ba0c8358d5805ac16eb8d53ed7f3c5dbf9845dcf5e3517a13f3090c3ae04023230f7831458204fab9781d09c2715046f747c59ddb11ed46d27156c4a5e0b3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD584e8ac6b191882c7198454b60bfc40a1
SHA16c0d806aadf05f9d3794b023d4f4cb506d4f3545
SHA2566289f7bea2e3b36ba5f44229972e91b9a91bf0a451c028a5108f8f4158525f47
SHA51233b2a21bd796c37e81dd06883ae75175c4b50344c4c8714f43ff5337ed57c636e3e136116dabc4fd617147b0f585335c29bcae84ec97ec2751f1c94245edeb36