Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
38b6842f889c13c1d6674e6b3acd9e7f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
38b6842f889c13c1d6674e6b3acd9e7f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
38b6842f889c13c1d6674e6b3acd9e7f_JaffaCakes118.html
-
Size
4KB
-
MD5
38b6842f889c13c1d6674e6b3acd9e7f
-
SHA1
4d937526f8e42fc4f01fb4f34a90f45919cc11e5
-
SHA256
315b1cb88fd1444d82aa2214a2bc0891c5369d876febf71e9b47eb38b3539dbc
-
SHA512
2ad0f42d7031c3949c19f2e2d2ae829c5015fcc11680fe31718776f1790e87d78fb837ccd68223cf2b290893708332cbdc818767a12c4d1b61f9494d5da83bea
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8owAJb+ty:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4292 msedge.exe 4292 msedge.exe 2452 msedge.exe 2452 msedge.exe 4000 identity_helper.exe 4000 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 3560 2452 msedge.exe 82 PID 2452 wrote to memory of 3560 2452 msedge.exe 82 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4420 2452 msedge.exe 83 PID 2452 wrote to memory of 4292 2452 msedge.exe 84 PID 2452 wrote to memory of 4292 2452 msedge.exe 84 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85 PID 2452 wrote to memory of 3516 2452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38b6842f889c13c1d6674e6b3acd9e7f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83e1046f8,0x7ff83e104708,0x7ff83e1047182⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,3146515031630173246,12550528787632838254,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
292B
MD57c39c60113ef8ae27678f64a27232e47
SHA13c1236ac122bcc057d48f4514be7fe9fb3f844b7
SHA2561da5f3c4f714c7621dd9935a533ed99990fb8e3a0bf3d8da5e94511691eb0c32
SHA51258fa5f290896330b7845d3d9fe78adfbe2c2b5361cd1fbc4ed6d7499e8c4511663ca64bff117f0be82790a9edfc46f5f19bcf4b3a678744444663fd612913470
-
Filesize
5KB
MD52d9099618d1f89324d01e1696cfcb7f1
SHA1d1bd4e12c093e21b3749201a324196eaab018e2b
SHA256ed10edb74e9265587160b46652cfe7a444e744c28eead4efe07dd1d08957688a
SHA5128b82f8ae78cfd4c19bbc0a6ad0e4f80fe65eeb88cc2c0bcef037d8ad4f2e94e3d1c9814f9aecb71680aad8bd4ce9fb8eb94d4c2a5b45ac5df8c56d12570d8b16
-
Filesize
6KB
MD5508e53bf2657326490f57e74e62de08f
SHA184745e5b46872e0dff6abaeba440f74344c06c78
SHA25634af983d534ff9ee88fe086c9de90dab1904bff5c3567429c0b8c21b9609b65f
SHA5123a494285868d3fc1e17e16b8df0c2af38d37e5bbfc2c8dce618d5579f934a62a954c4b2e9db30f5d7206c2ff210cb3e5aefe3f7fb9c717d7b78b3c2e723b4f00
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ec8273414d74b617a3ef37c1afe937fa
SHA1e36b0b45d15b6b53807b80f367c260d80a3f3203
SHA256da349c9f67bcbea7389a8e24017ac79e84935ddcfc4bfd1cb46216406fff28a9
SHA51261019791c3335fd15d88123ec5efb6f279c03146a9a93d26558766e2fd4a7c943d3a09f6a05bd87bfacc861f4e431418f2189cbbb78946bbe70175162d454984