Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
44911ca85993197f51d4117b8943bf2a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44911ca85993197f51d4117b8943bf2a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44911ca85993197f51d4117b8943bf2a_JaffaCakes118.html
-
Size
3KB
-
MD5
44911ca85993197f51d4117b8943bf2a
-
SHA1
281ed6a9e816dcd08a6e05e66400c8ac56716971
-
SHA256
26a768f648d0331d2f22df21e9b470ed09d3d28776ba9cadfe2dd2634ae3ca99
-
SHA512
2515efb8dc47f6074c999efffa7837a9a0b8f254f35dd923ca91d698f68adcf94254205bad20086ebb890a68eaeafda293a568664a42395a8595e2e321a7813d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 2780 msedge.exe 2780 msedge.exe 1756 identity_helper.exe 1756 identity_helper.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe 1180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 1948 2780 msedge.exe 84 PID 2780 wrote to memory of 1948 2780 msedge.exe 84 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 3920 2780 msedge.exe 85 PID 2780 wrote to memory of 4032 2780 msedge.exe 86 PID 2780 wrote to memory of 4032 2780 msedge.exe 86 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87 PID 2780 wrote to memory of 1620 2780 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44911ca85993197f51d4117b8943bf2a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef21e46f8,0x7ffef21e4708,0x7ffef21e47182⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,7833693700064171666,2610230811270377277,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD531d8fea54e5fe26b966d714bda555bfd
SHA152b132c56946eb209815d0eeeb5f6ced69708ed3
SHA25605c9b3e800d690e14eac26cf39023f4143cd076b7f742e875639532eea5aa9c7
SHA51282f74c05cdbcb4f729511a831c3c14d75a9ea97030e84087ee5b51a3b840b8f989ee2ef22290ca71af68505a2fd912660c77dc26dbf1bae4fd144d133ab62d74
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6d199358-9a8e-4b73-a8ef-0c179ba14382.tmp
Filesize6KB
MD52f033a7efc71be7bbdac95ca387b3682
SHA120660503918d5deaf37947662c8ffe461deb6651
SHA256b56c538eaddd838deca6d92a5a9e6704f56370b7a7bbdfe32261f3072a3bccdd
SHA51262dc56c8455910a9d41b0da516aa6f73a648b0e713c6efebe344f0917e954076571461606c2869c70304b6d11ce75509ead4888b08bb51901fdbafd0b5106e6a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5ca252fce87ad1b380cd48f2767a015c1
SHA136ec2f3b1421cbfc0218b48ce045736f7002c8dd
SHA256fb40c3236259a592a4d85a7de0f0a69685f34d34fe78962ae930983c6c626d98
SHA512b8f0eb0af7cba9e3cfb76b43f385f1009ccc1b2b3cd40394f2d6ffc5fab3148d43f4d1cb9bda98cda52c0f746008c4b8326fe486f1309fd536ba8cb43e2ed41a
-
Filesize
2KB
MD5fcb87a47fe0496eee623d625241ab5be
SHA13431a73285b01ff06350f40e2c3352156218cc2b
SHA256238d5ec532bc3af2a33dbcc60be5edeb0a5d39daa1a5f31302ef7546919f801f
SHA512c9a3ad5f8abf775c890882e7262556e47d9d364cfd83b91730aabb9cbf97c09c1e8aeccf7a27c3b535589db87c580e90a2074b9b8eea56d3df7e549ff90c20c7
-
Filesize
6KB
MD5323e706246c3300de6811f64c207b88b
SHA19c7818d4fc556a0476f1fcec8bb057a63a0f2b02
SHA2568aade885dbdffb315e0503fb1721ef68403aec61d80ec365b8787b0d26263db3
SHA5120e8f7b47f3a2769ecbbd1bef5cdbb7fc52e94221b65b6a5df74c848e6d11fb82d77f883fccbe61ba7b40dd0948f3af5a1d4bd6d1d92d8e9f5c0b95fa8d23ea9a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23