Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
44fd9f3062a2b8dfeb4ecfe1861ae963_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44fd9f3062a2b8dfeb4ecfe1861ae963_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44fd9f3062a2b8dfeb4ecfe1861ae963_JaffaCakes118.html
-
Size
139KB
-
MD5
44fd9f3062a2b8dfeb4ecfe1861ae963
-
SHA1
df778de7d30c07280f6f810488f286a1fff6305e
-
SHA256
56eff356c18f88f253715bd23710eb96623dc1f0a846a7f8d00d1b38982d97d9
-
SHA512
858363c458449b96aded9fe2c69c493ec690ba0e37bf5ed6b2fd679df8ba30033e2b6f2acd266030d8a449e7934a9d620287605e503bcc94bfd34345a1a8b65c
-
SSDEEP
1536:SyzGvaIcm4ABw/rGmlhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SykoyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 1244 msedge.exe 1244 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1920 1244 msedge.exe 84 PID 1244 wrote to memory of 1920 1244 msedge.exe 84 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3608 1244 msedge.exe 85 PID 1244 wrote to memory of 3304 1244 msedge.exe 86 PID 1244 wrote to memory of 3304 1244 msedge.exe 86 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87 PID 1244 wrote to memory of 4232 1244 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44fd9f3062a2b8dfeb4ecfe1861ae963_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92e0746f8,0x7ff92e074708,0x7ff92e0747182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12090151439483139588,8597622370514112022,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12090151439483139588,8597622370514112022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12090151439483139588,8597622370514112022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12090151439483139588,8597622370514112022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12090151439483139588,8597622370514112022,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12090151439483139588,8597622370514112022,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
6KB
MD586591345a25ee75a1b16c12c75f494be
SHA1bf2e2193682aa56939b0ee851d6580696f87688e
SHA256e8f28df06fd79ee93578283dec4e0576759c60a2d91a3838cb38515b97935824
SHA512f0c5b2f38043036c976972da491e0913d7c7689be1e81624abf5da445537774a9ffc4ad4307a936d2ad4c53791952a9377fbd758820719d0290ca71dc46e15bb
-
Filesize
6KB
MD519c776a8442a996089dfcac218e210ea
SHA146527984bdfb35ac1a5e3cc024870e4ce3b6a311
SHA2560289f6fbc1377d7dd4442bf0d1e9f12c0a18f894c12aaf96d42d8a418248c1ce
SHA512363d8c7f98f3643f74073b5de5c7b50a2423629c4dfce87967bdb701b9e40c527b9cbacf431c3fff2210ab2473b1f2758aaf89483733bd2ea3cc6c2b7e03336e
-
Filesize
10KB
MD5d81774b6d03a193e6c9e6b092de97789
SHA10070756072513351cb5d4258c9153b8d079a4797
SHA2563edbfac24548953752bb792e6ea7dba66abeb545dbbc0bfd2eb8c90d4f8a06f3
SHA51276f2206d2714dba9479cb94dd077f2db792b4eadcae55143ec0f5291d70db457b74488287a3fc940d14a97b52c8d9adc933ebbc82b8acbf42427c1e9ba420e90