Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
38bee63bb29925764ee58765f99b7319_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
38bee63bb29925764ee58765f99b7319_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38bee63bb29925764ee58765f99b7319_JaffaCakes118.html
-
Size
38KB
-
MD5
38bee63bb29925764ee58765f99b7319
-
SHA1
e10bc56319cd63c45ef243d7051c333e78be494b
-
SHA256
37a3561edfca315b4da742c82c793f1de26335e5c797b3e000edbabd1d7adc76
-
SHA512
ad941b15d3c195f0a56a5ae6e34f3e04a87cf4a4dd3a04d32a92fc4ebc4fe6425e5b5bb9fc5ecdff6c609057932acc8d40a1211257139ea55a89c291b79212a5
-
SSDEEP
768:RkTaVRlXhzX/RpDqF/NkM4IaQbu3Df2kanLxxMKKR+QU:RkuVRlXhzJp2F/NkM4IaQbu3Df2kanLR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 1624 msedge.exe 1624 msedge.exe 1304 identity_helper.exe 1304 identity_helper.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe 1624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2864 1624 msedge.exe 83 PID 1624 wrote to memory of 2864 1624 msedge.exe 83 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4248 1624 msedge.exe 84 PID 1624 wrote to memory of 4880 1624 msedge.exe 85 PID 1624 wrote to memory of 4880 1624 msedge.exe 85 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86 PID 1624 wrote to memory of 4372 1624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38bee63bb29925764ee58765f99b7319_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa62146f8,0x7fffa6214708,0x7fffa62147182⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1712 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1680 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,13123120629302678117,18242559560707912272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
818B
MD5af82419bac91dd332d43403c1efb1b28
SHA1baba79b5e54e63db535180bde95ac289ae7edb12
SHA256d9065e24ea2f7c16b554e68bd3acd19112c0b101a9fc529d999c0078c3d404c5
SHA51273c211aa782fbf8ae75c4499cd5ae522fbca460651f3e94fc02b0737218871d9a40d9ba6ecc039d4906a4996a1f52a21827f71556420ec026ceaf2324849a8d3
-
Filesize
6KB
MD58092efebd16ead27d991e3558fc35ca4
SHA1335a3879cd69871a02633735331b1c656c408814
SHA256b0da5651b83f5cb5821b5226c13445b22be59378227b6cdce69f14d7da08dfd5
SHA5129b044ec322e4e2eb753140e25a9429b68e39b1eb1da4fd11575d5db7b8f6789219b3e27cdb46c19668b29d2f35ceb3801fd18b06edb45447141f2be8c2a2b98a
-
Filesize
6KB
MD565c36c1c1d5a7ee8b42813afe7e85f6e
SHA1d7485aadc00877fb481b9de6f0dd9d1a8ea3e911
SHA256b892546079ccca6a309e0c18f3c30399b881304bada458174921882271960847
SHA512250c1dcaff89404c13e13834915c07d3102e04aa82c502db0d3cafd0db8efa06af714da324000bf6db086f1b1312376a3fbcd4c0fc16d4aa63a9b66032f320cb
-
Filesize
539B
MD5ba868be22f31f3629c9c1102dcf97d36
SHA19ef305b0cb32845e29162194da5f064e716bc378
SHA256bef977b3ba5324e6535050ae1bd910e92ecf4a1b9e8442ceab62a5cb510f09ad
SHA51295c81903d064066035b6747c6955b665e9e5594d91dcb88500bdd17045f551bd444932e1831df9c12ed04685530b46f3cf53bcbdffb7756d38a3582bf4205648
-
Filesize
539B
MD5fef60c649a10a4af6b70b2b4a55e9c33
SHA1b2de1b749e30e4b3737920b8a0176da401d571ca
SHA2563ab6a34374a0b516f21026d471f79e04da9e53517c7427219dd6ef54a833c5f2
SHA5124644a65868cf3797ec17ca350ff8e032cab6bb746e7c29b0037c15b41499ab6545b0620041f11d5b0e90f5bca176324881e2549990a15d02b665a5399162534d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD537a084ebc7b4ebc4dfcb0d645e1e396a
SHA1b84c83a0445f82f295b91ef96500ab2f5e4792d5
SHA2564fb7d8a4db3fa61a7c82eb8b535784b5b384cebc1192b8eb88afadc41d93a477
SHA5125af32ed113031de453d1eec211caa558fee224a1e053310a216c4899ae8cc83df1b84b5116757b42baa05e30ffb41369af2f280c4164054907b2070566eb0491