Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 00:44
Static task
static1
Behavioral task
behavioral1
Sample
44fca466f1949f9ca00a421a0f41a12a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44fca466f1949f9ca00a421a0f41a12a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44fca466f1949f9ca00a421a0f41a12a_JaffaCakes118.html
-
Size
139KB
-
MD5
44fca466f1949f9ca00a421a0f41a12a
-
SHA1
b1827e1bec581bffabac11ff53a470570e8c96b4
-
SHA256
8ea293843adfb3d01b22e615009f030fea35a076120089f6fcc700ad7255985e
-
SHA512
4ce46c6592869d3c9f5744bbbdc044100b7b7c4f0133f726e1a4795dee23b81c2c27546512379bbb9491ede8a43b5002eb3cd5f38072d830a285f5dfe7d14f73
-
SSDEEP
1536:SwNnmEbenkxyH7Cl5yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:Sw3yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1332 msedge.exe 1332 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2000 1332 msedge.exe 84 PID 1332 wrote to memory of 2000 1332 msedge.exe 84 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 2624 1332 msedge.exe 85 PID 1332 wrote to memory of 1060 1332 msedge.exe 86 PID 1332 wrote to memory of 1060 1332 msedge.exe 86 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87 PID 1332 wrote to memory of 4912 1332 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44fca466f1949f9ca00a421a0f41a12a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bd7e46f8,0x7ff8bd7e4708,0x7ff8bd7e47182⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,11508882305817129579,1461985727171001117,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,11508882305817129579,1461985727171001117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,11508882305817129579,1461985727171001117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11508882305817129579,1461985727171001117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,11508882305817129579,1461985727171001117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,11508882305817129579,1461985727171001117,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD58a1b3b642d720fff013175bf16c1509e
SHA16a1b51acd8b42e65a52137c34aa2b85eb02e094f
SHA2565f9bc41c1618a56fa04363c3b908228f4caa558babb8d02c39983e820e9b54aa
SHA5121a0c0b61f96f46dedee538acec1332b2e45d8cc97effdf46196a40d0d527554aed366dd38ab4c0ac00e5c94a72f8ac24cea85479dd6786927b181b6f79a0fd7c
-
Filesize
6KB
MD51fa9cff39951aeedfd7ec90c2f113582
SHA121514819a3e6401521202a7a6265b79dfd823233
SHA2567e77d56d5ff2fd911677ea7693ee758399408cfbc262cef7bf1ca95796e3d6ef
SHA5126484f1fe43d77cc9624cca3c0c18f5862e1269b47d3a3e0b2b3f4598c61b997c6762474ae56cd41f57577213efb8c1f28ea570110360e629b4ab67174dd92f39
-
Filesize
10KB
MD5f2ab4113923c9fc197485a87969d1010
SHA11401b5c8944a6f07107f7ed654665ca9d6e8b574
SHA2568b62eff14f6b83f8b4f2e3bc6d957b9a9801e073105b146986c5dcbe573a6c1d
SHA5129f7972253977fbb1d878aeb39c660fe43d2f7b6590a7501d840d6ee0569e9947b41d726efcb27e4442fcd0f7781bbba7662f4ecbe233635baf64d8b24675e592