Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
38dafa67162d965140b63efeadb26a66_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38dafa67162d965140b63efeadb26a66_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
38dafa67162d965140b63efeadb26a66_JaffaCakes118.html
-
Size
106KB
-
MD5
38dafa67162d965140b63efeadb26a66
-
SHA1
5e17fba8d5123b76f1f38402f2ce0865ab6fd677
-
SHA256
476740a074ced0ba128b41e3815439c67e2abb7cceb9432dcf9573b4e838fd79
-
SHA512
dac775593c5b6aa398bde74a7553491971cc51702489d2c6883c3eec66c0be082506e706557ecf3e766d8690767e9c3e73216ddfc12017f0a6f1368730692995
-
SSDEEP
1536:hUzX3H52BAWu/i/9JxJ1xrf5JvnofEztvI3rNiuyfMulgDndDaqpPka5QJ6KeUPF:hUzsuaVHJPrRZtvlma
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 3520 msedge.exe 3520 msedge.exe 3224 identity_helper.exe 3224 identity_helper.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 2980 3520 msedge.exe 85 PID 3520 wrote to memory of 2980 3520 msedge.exe 85 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 3180 3520 msedge.exe 86 PID 3520 wrote to memory of 2140 3520 msedge.exe 87 PID 3520 wrote to memory of 2140 3520 msedge.exe 87 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88 PID 3520 wrote to memory of 4660 3520 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38dafa67162d965140b63efeadb26a66_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ca9346f8,0x7ff9ca934708,0x7ff9ca9347182⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14826943090698332455,12649927645915664348,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
584B
MD5b6985e0b9edbd98d52cf6f21971f1e1c
SHA1e361fe5c7ae0aeabe4e776a2924763c060b9b226
SHA256c01063bb054cf533c90a5e0046831d9dfcdaa667aa20548bd8cc10b4774f5a8d
SHA51207e60df28fd28b8afa434036f28b3cb293293d39486201652d4e24c7f2b8a57b1f1228e6318a6d0f769e9c89866e8e4b1eba08b5f05654d6c56c48bddb19ccc9
-
Filesize
6KB
MD5a7c74585fdfe358332a1152d0c51cf2c
SHA19bb12c300f788666c25d88227259c0e7de61772c
SHA2562beb7ed3eaad923ff29f531f20bc91cba3dcf6303cb2f3be365329b0233c5422
SHA512137464e8f8278ca5615f9454be46a1829d9cd858cb8eaecb2da4f7591121407a4ec43de28afae8f495fab0b38b6b6230819a18fb27b6997c12a623355f3e6473
-
Filesize
7KB
MD507826ec710e064baccbfe7d922813100
SHA1f5a5b775edd4841fad6df7205205613bd8f6732e
SHA2560e1d2873510b00ea33a92c93ec50eb7143923ad6f78b0907631cddb754afdab2
SHA5129f126829ce8ec456242767ec9d9f9dbeba64497edd92813da052345c8de06e69925f740d10fda9a638abfeef2c93153355c85098ea25802afaecc12a8bb58ad0
-
Filesize
539B
MD598c0f8ffab791ffe583e899e30406676
SHA16fee074919e05f79bbf5bc3b6a12892e75ebbd66
SHA2561ebddd110a16d5f68d284c0ee2a91f113e02d30b77fb012dd2f4a328468607d2
SHA512950d73b6ee82d8098cc5e1215c206020abc94dc47911cbf33d8e8081930f9e2587f93ebece3c3ca8277a315859dedce3e2fc550d71f35cd4b4f25c7928264112
-
Filesize
371B
MD51398ef283dfecf44f05b52c3604124f2
SHA14c90377a69553ebadfcfd673d4bf88d94059d626
SHA2568455fa8d4acf7ec4cd5bc44e68d52266887cf52da35d7e2124d2fc52dd6ed648
SHA5124cb9c145db8c92256346719567f18315d46ba1bad66e9bb6c87d767e48444b8498fbc742dde97a941f7d8307467a4f43b73e75315bd0f23eac552697f356557e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54fa57f1d4d799f313576f2689acb7886
SHA14159998cdbd065cb47aec6cc53b349f6a3f3a683
SHA25686b14074d131dc56fb606a6eb4f84fa1d75ee67d8af78bf1fe3ef8ab1cce3439
SHA5128c374880832ed0165b5becd1018ade666448d565356b6ec72d86ab696ab1f1fee6a58e8cd8872ae027eec91595368c053ad6291b67443fa5aa11fc3dcc10cc42