Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
38b216e8da9eca89642fff21b6c689c4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
38b216e8da9eca89642fff21b6c689c4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
38b216e8da9eca89642fff21b6c689c4_JaffaCakes118.html
-
Size
36KB
-
MD5
38b216e8da9eca89642fff21b6c689c4
-
SHA1
15031cbe3c7d74e78f3a6cc32130e877581cd2c5
-
SHA256
551ffefc73f49588caae2ead3567f0c9e86df1effebb0cb3eec99eb29e52edd9
-
SHA512
4fecfb1c04b7fd5ce6ceae373b39241186f9ff1aff01d3097ad6a820913663ead604a9d9bdf79039167855431d5478d69fa3757facc242ba78bfa22cecf723f4
-
SSDEEP
768:zwx/MDTHK888hARsZPXnE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRc2:Q/rbJxNVuu0Sx/c81K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4812 msedge.exe 4812 msedge.exe 4520 identity_helper.exe 4520 identity_helper.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 464 4812 msedge.exe 84 PID 4812 wrote to memory of 464 4812 msedge.exe 84 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 2280 4812 msedge.exe 85 PID 4812 wrote to memory of 4960 4812 msedge.exe 86 PID 4812 wrote to memory of 4960 4812 msedge.exe 86 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87 PID 4812 wrote to memory of 2972 4812 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38b216e8da9eca89642fff21b6c689c4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffffc5d46f8,0x7ffffc5d4708,0x7ffffc5d47182⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17742722192868854511,17295899827405229411,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
613B
MD532b64c7d3d1ac17a5b43bac6e0ee10b2
SHA1cb6657aac7b953af7bf6c6745c52644a08a0fbc2
SHA256217f34405a6329005c61693a4f4c37b1763a57cc9dcfc4f18ce16bbe21438430
SHA5127b86d52ae16f3e2f79a5f021bc80f6526147866e74b0f689130e27ed3dae99535664aa9c8729c99e6627a1319544b04e570f473d0216a5a901a36459b0463383
-
Filesize
5KB
MD5c2765b3dc7f6538736ed1e3b4b3c48d1
SHA160268d176e81b1bd070940d868aa0638f0ba0c84
SHA25653929bbf14cc05eb5cc10234364a37dbe958aa751c0c966abe99536413d6304d
SHA512b6956ac1e5d4272567835f7501498709828c4c041222cfb9d96834a04112d9bbeb2e07f23013aeca083282511fb5e456f3ec02f28c18b59faf95330c88bd9dc0
-
Filesize
6KB
MD51276ee6cfa098491e5bf300f5ac29420
SHA1ec5197e19df0674e316accc9e34e09e83fba5fb2
SHA256c6aa5a5fe34bbb38325a12664991e696f0f70901a854e9428ae0b84d2cfae81e
SHA512a90130a093a8192aee92248b911079aaed0b60e43ea7cbcb2c575e96f9725803c9abac79036f4217f6b846a07ece87bdb4cbe3683d65e5fb9757b2e13f1c8231
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5ecfd91ab47aa404f7214a5264293a031
SHA1603d315129750f3f9a37b2e2a8051c42787a1556
SHA25668e9bd8ac76e38cc6e3972a7fd943e23f26c53a4386d8b7f3a9ee5013c4464b0
SHA512b65551faa90b690488afcb078a7fed36caa8f151c5aa52c0d48ccaf4956b5eb64784b0e60c34c9fc458c9a5c1b05d42e4c5438221b2858124b928364b5e856b9