Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
44aedeaefb88f4f245c9aac28a84f1d9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44aedeaefb88f4f245c9aac28a84f1d9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44aedeaefb88f4f245c9aac28a84f1d9_JaffaCakes118.html
-
Size
138KB
-
MD5
44aedeaefb88f4f245c9aac28a84f1d9
-
SHA1
bde021c974fa597726aa58e8792e789e0834bf71
-
SHA256
59223acffc85e962936dea605a6f282e6e61a8257f9ae99b01aee105dcd5dd62
-
SHA512
adf70b533f6ee00f568a321f8986e95f4adb9b1e8e6f825af602d079de2cd73b15ef4cd1bf43cba439620fcd127056411c0aa49cd9709a4ecca2eea2da92fa25
-
SSDEEP
1536:Sy1RFNssBem8lkGyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SydFGyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 3492 msedge.exe 3492 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe 2348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 1144 3492 msedge.exe 84 PID 3492 wrote to memory of 1144 3492 msedge.exe 84 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5072 3492 msedge.exe 85 PID 3492 wrote to memory of 5060 3492 msedge.exe 86 PID 3492 wrote to memory of 5060 3492 msedge.exe 86 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87 PID 3492 wrote to memory of 4488 3492 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44aedeaefb88f4f245c9aac28a84f1d9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac08946f8,0x7ffac0894708,0x7ffac08947182⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,8571233543202101579,18222104921495188172,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,8571233543202101579,18222104921495188172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,8571233543202101579,18222104921495188172,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8571233543202101579,18222104921495188172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8571233543202101579,18222104921495188172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,8571233543202101579,18222104921495188172,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5fb45ecd8630483426d01e3bc2ea2931e
SHA1492f044a4c7bed1278ca892b593b5d6106ca0263
SHA256e8ce2a609e2e6b9888bb3c8e6b066f6a0516677cb0b3e3c1acfaaadf45121347
SHA51224615ce81cdb319940e5887c0fb15b7da15a2658512b2fc287d5d17d72490af5007e18092aaaf68d848e1e12fd08bb80c81f061da1fe771d5615fd41890d83d5
-
Filesize
6KB
MD5d548894b632946065fc4c761cd9928a5
SHA1186ea382429911c80e09f317002df76747c5838c
SHA2560d2abd7e4499e7c2979e1201d6f0267160716c78e3c11b8b8fd02357a4e36cb3
SHA512fc91eb985e3eecb0e2d333342a435e8e660da458b67885a9b1423ca8621ff6e806250a449156158307272f961e4a8b775cdd516adc6d1defdf5f0dd5c6b3b153
-
Filesize
10KB
MD52c76edd98dc1ca86c5281e55198f232f
SHA1c77cf448ae3102b7aad7fb05e955bcde41ba98ee
SHA2568efe9bc4aa66c97061cff70a2fe45e9d4bb11f9a23ef0fec780c5c6c6a589f4b
SHA512e02782a1ada7e885a66d67ebadd5b75a633a70179d734f46e025e8b30631cc2ab0ce5473500d7b22bf922222fc434f8396783e713354f988db49b704933168fa