Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
44d17aede36a165a36b1232034b9130e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44d17aede36a165a36b1232034b9130e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44d17aede36a165a36b1232034b9130e_JaffaCakes118.html
-
Size
37KB
-
MD5
44d17aede36a165a36b1232034b9130e
-
SHA1
c73912572f076173273fb2460737673e0be070c2
-
SHA256
364c72a365d04fb33ed6f2973d58a52d1733e68645cd09ccc6f8f5f34dfb235f
-
SHA512
2efe014f0691a2c110d5e1d4659a9b3a2bb096f6924376cf14e586e264c1fc3a2591d8633c667f2bf8046d2a01790e6c5a518f66e0f2a6a1835a7a07eeec646f
-
SSDEEP
768:sFi8f5SewEr7mONUyerZOir/yhb02O+eW95hJBzduJxBbk5vbIT+ZHWnapiWzrkk:sFi8f5Twi7mONUyerZOir/yhb07+eW9V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2720 msedge.exe 2720 msedge.exe 2512 identity_helper.exe 2512 identity_helper.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 3704 2720 msedge.exe 84 PID 2720 wrote to memory of 3704 2720 msedge.exe 84 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 1416 2720 msedge.exe 85 PID 2720 wrote to memory of 2496 2720 msedge.exe 86 PID 2720 wrote to memory of 2496 2720 msedge.exe 86 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87 PID 2720 wrote to memory of 3008 2720 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44d17aede36a165a36b1232034b9130e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc27df46f8,0x7ffc27df4708,0x7ffc27df47182⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7758123303908929839,1754661798280629236,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
412B
MD566156936da452aae3b9ef546df4ac0a7
SHA12597cfb9f544da191b7684aace23223630ff8298
SHA256417f1625899a48303ea17a74d4860509aa0d8553ce864b901dd92d3e30273961
SHA512a017acf8ea7288ce174f49a84b20c9e569997db0478ce2f205afa4f38d8e51896f5b0304d5ad8f84e9654dc4307fe6c730ef9821046180416f5fe64a49256f05
-
Filesize
6KB
MD5bbfac3cb3c3ee1d8053242a489c854e3
SHA1ff8588766c4b85efec98574aece8b473af273ce0
SHA256304c9f9db05b4e365855a3f311e15530091312040775e5b1aacde8cede8cad69
SHA512f665e605747ecb5787efdc023172bb1a9dad97104b9a92e331bcf3846a9ef9945c28055eb839a5b592347c57b754906132559be4338b17a27dc29e374c3af71e
-
Filesize
6KB
MD53f65c66ed3a6e3cb46e2af8c1473d9f9
SHA10d0be2764e883968034b15a984ecee989911a4aa
SHA256effdd3caaf7bbf3f15d8450311233226beb90ae25869313ec9684b239352758f
SHA512fec8174a2a90353c1e94a0c299e561097c33e707681cdedca8b36875007194851558bf75520df4fa4b67e1a7b82f3ab73a13ec1549d83a21156cf51c47c12d5f
-
Filesize
6KB
MD5bd6d94c29975ef0123944178673ef9ab
SHA1c984230fe0332e797067b6f36e210a3e98603175
SHA256dc5db2a00a66a84e7321f44514ee52714cb2ed89682aca63c1456f93e78c681c
SHA512e05eed2f1382d284c73940115c54660c6ee38d129eda4309298aad11687f74af70fed86868c3eef011545b818def2a35927fe120e999a88cab78d01ea7442fcd
-
Filesize
204B
MD565ff44dda9b88f0a1ee75a72d783f32e
SHA1bedf427d16a840bfd13988dc496619195f954b28
SHA256144fb2db3f5e5f81ce65fcd9fb92e2c14bf84a962178ed2cb277ba1e690e8487
SHA512c633c0a411799b0c58b9697a84f045e4c5886e21b167f34e94d4a2ce1709cba32853ad95693116722cd4debbcf863cad751f33332cd1ded5be22d9dc00284273
-
Filesize
372B
MD5c9b81c370a6d23249ffddf813efe27be
SHA10861c0c94996cac1f40bcb8bf1f6ae7c3246c17a
SHA256674b9f472924363e5ab0ac567475ec3155a2c3e9ed4e8f42615e0d4c3099316d
SHA512c28fedaa049464dc3c0850ea7029f7951bd04f6961ac24a41ff79c23a29e0d918d9807c342bccb988d84af56b3c2f5f029251a660e1076a7fd5130b442f70daf
-
Filesize
204B
MD5ff05a177a581cf412bd8cb80688957d0
SHA180fa380ead59185cb3234a344c1b1e4fd2e8fdab
SHA256d02f4be2b8ae89524b5833185ac1d10d7c9af1d05acc59d82832b96f272ed02c
SHA5122feecb4a85fef0f17bed10f0d20fd8290cddab381c8166726f030eaad596089e4cd62d600e1718808b88b2cd2389f183accef59e93f3d4e39c123dd44e0a43f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c601e2449c72e5e5a9f1007986fb5ed5
SHA141a56b4a964a1203656d42c59ca87450e1f0b2c3
SHA256740eab1682e895abe84c9df66f947d5be4e018ff006654a063cfae1b3ae34e75
SHA512c3d5e37bd0c41343341e560cabf05465ca4914fe80edc719483410d3a7b50d8f15b4505fdcbf9dbdfb56db52b4fc956fb80d44f672e1f868ae0ce4096a04610c