Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
38ee6e095ee8b7ca4279fb344fe9b79b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38ee6e095ee8b7ca4279fb344fe9b79b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
38ee6e095ee8b7ca4279fb344fe9b79b_JaffaCakes118.html
-
Size
57KB
-
MD5
38ee6e095ee8b7ca4279fb344fe9b79b
-
SHA1
c90ef157fc91fb1d535c467cad94283823a21340
-
SHA256
c5f5aa3e66a38495f00dad4b9b8890202a635fa4605139d6d92121bc5e1c32ce
-
SHA512
dc891758cdc046b0387216530e526de90634c90b5631c4506d75fb89ac6421df30192c67cb87598665164935d233e1385203869f774e1eb9c4b0a8e40ba6928e
-
SSDEEP
1536:ijEQvK8OPHdFARNo2vgyHJv0owbd6zKD6CDK2RVropBwpDK2RVy:ijnOPHdFwW2vgyHJutDK2RVropBwpDKn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2148 msedge.exe 2148 msedge.exe 2516 msedge.exe 2516 msedge.exe 2248 identity_helper.exe 2248 identity_helper.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4044 2516 msedge.exe 83 PID 2516 wrote to memory of 4044 2516 msedge.exe 83 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 4724 2516 msedge.exe 84 PID 2516 wrote to memory of 2148 2516 msedge.exe 85 PID 2516 wrote to memory of 2148 2516 msedge.exe 85 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86 PID 2516 wrote to memory of 64 2516 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38ee6e095ee8b7ca4279fb344fe9b79b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd706846f8,0x7ffd70684708,0x7ffd706847182⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,9744060117046620205,2740848933647005358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD58878e740f544d099e2efc92b38756460
SHA1d462d8471f5a26fe627ce72931764577c0593ae2
SHA256436b89bbd4af12cc72b7ba7ed50c10122cdd472799f3fc2b19f613980d3e773e
SHA512afd276608b3c7dc22406349ca7ce35b3f57376915c7a3ab1646d1bfbedaf6282e24eac79ace1efa34dd277b571dcf54b4f49f6279d782f03ffe108e67785c50f
-
Filesize
1KB
MD5c28c52acef7a4df159ec415492cf1701
SHA18a06f5663dac1ea3136baa01b0c6da71e77bac90
SHA2569c3702d0b07d33ce0bd7548077b342178bbc160f177c935cd244699276d53489
SHA512db02df174993f0ae6b3cf02bcd9d3e557feca8da4035d1cd6efaa4d1ca10f7ce68a540ffac3062365d677ebcb2a2c29fbabb22df465375d8d022ba99397d9440
-
Filesize
6KB
MD56d0d7844880b67eb434179da2456caf8
SHA12e69340d7a4ed5dd5f4757d170a4c80b0de490f9
SHA2566d8252880e47de32ac84b06d1106b5e8f78f77a8f0393be9e2cc240eb47c08a6
SHA5123d06a3bc8fa4c66de5e40f1ccfa703ce320176d1b004bb6bc42ec39f984a02e8b97ca33c375a441b80bcf2dec8f4ae2bc8121d39ab38502e0dfc6d253405eab4
-
Filesize
6KB
MD55f7cac43df69b92b621f66f2b71a4236
SHA1d4d0450626bab1516d21e91b4363b09c0a8b4f2d
SHA256d6c8e01a3550567236317c0e53eb47815b3e9b4a297be10dfcbcc0e50ccd1fee
SHA5123df52482acc3ef602576efe308c785c563702a22eb05a0de1e8366256ce313fc9b72dee14c32599fee4e2ed1cba4c5649a6dc0e804a1ba78df92af32be166848
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5188453192298bfb2d8b92839705052e9
SHA14103bb20295344f83c978f7b241fc594ad8f1b9a
SHA256e18b96e992e3daa0413a61912609c00b388320dcc0270eab6bee5ccb91a92d05
SHA5121e830e3656a44a6728d6b62800ccccb238c14c64facc01651ad30ef714b55f5cd29a1f68e7a90ea751336927a093f811f5cf5950f6aefdb66ccd83b8b662cb2d