Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
38e9d9a2eeba408ff9ff4d50c04032b2_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38e9d9a2eeba408ff9ff4d50c04032b2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
38e9d9a2eeba408ff9ff4d50c04032b2_JaffaCakes118.html
-
Size
139KB
-
MD5
38e9d9a2eeba408ff9ff4d50c04032b2
-
SHA1
f74859ff58cde2f5f800b590cbe80c7dac50ede7
-
SHA256
03f3706a7538e9483d1568679c1a451b83f5274ff282324cc88e081776c24601
-
SHA512
41b41846dee0364ac728ce86b168f942417efe9095f43ae9f07d08f21b75280e83bddc2342fff5401c044cc5c3f3ffada741c14abd42a556ddf2924e9b30be51
-
SSDEEP
1536:S4HUNeI9xlhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:S4Aea9yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4200 msedge.exe 4200 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4200 wrote to memory of 1784 4200 msedge.exe 82 PID 4200 wrote to memory of 1784 4200 msedge.exe 82 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 83 PID 4200 wrote to memory of 4060 4200 msedge.exe 84 PID 4200 wrote to memory of 4060 4200 msedge.exe 84 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85 PID 4200 wrote to memory of 2152 4200 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38e9d9a2eeba408ff9ff4d50c04032b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d9546f8,0x7ff97d954708,0x7ff97d9547182⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,17477791776413845190,2180569655246878700,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,17477791776413845190,2180569655246878700,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,17477791776413845190,2180569655246878700,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17477791776413845190,2180569655246878700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,17477791776413845190,2180569655246878700,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,17477791776413845190,2180569655246878700,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD56c5802e48e3314d21a8e8db123148e6c
SHA1c3c357bcd53caa944ac4fae7bbf35512cbe2ddf7
SHA2563e8c23e150a296222820fe5a0d9a0c387c9379d6234149bcbef9b8a55ce7da3c
SHA512b1af54446c488557a4b06a347462ff2acc91880e4a4a3018decf3c3f336f8e8e06259877a7f12f227b054ca6f18e05891453030efea1d052d9b0dc152e3cbfa6
-
Filesize
6KB
MD53fce7a6536f3715ba8d56e56d364e5dd
SHA121bb5fc2659d1f2e6a19d2aae06d0a6bea2034f5
SHA256a3315040466465b090d1e022a8b7003a7768e799345dc9c71aadc23e2c04f764
SHA51217aaac5995fd99c4348e5be135ce29a9f9cf53fb1062572a436618ae5efe3d2e8022ca4accf79287019b54594a3042411ce8a03877d79e62f4d19001d9afb9b6
-
Filesize
11KB
MD5a7d9ff12e82ad8f2e3753111d5c7d8b9
SHA154a1b8c4ac3f1d737d32f9c450927906aa86d092
SHA256a6f87822e84b3fdd1326d935d89524ed3998cad4920a3bf7e10bb489c461aceb
SHA5124d9b0dac1c706e9f6e4ea93be3f1fbfbf5c9d8624fa034d015efe109a0a5f1b31ab6db65fb56697eb10822c5397e1710b7c58ad4d242e9b6d8cb97c7c5a9a821