Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
38e038567052548f64c957e02297ef81_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38e038567052548f64c957e02297ef81_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38e038567052548f64c957e02297ef81_JaffaCakes118.html
-
Size
12KB
-
MD5
38e038567052548f64c957e02297ef81
-
SHA1
970a897bd8e2862b0b5153165bdd75d99ae93fa4
-
SHA256
b8cf7e6235d13e5e3431256b76f554eac683482089304b7d67a230733704cda6
-
SHA512
185c8420534b3f32968a35755f8758ad4e4fdc35294b26a7ca6347096e624c1120af3d1a08987e02140c470b771caff1a7c3a1ab15833f3e124902cb0ceeb41c
-
SSDEEP
192:2VGlIsr0KXyJvVCjN5MN8k/w1whqJk1KBxZJnH6QzM01y5uBuLbdU8d:sGlIcMVSjMv/g6KBxZJnH6QzM0y5guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1200 msedge.exe 1200 msedge.exe 3384 msedge.exe 3384 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3384 wrote to memory of 1948 3384 msedge.exe 83 PID 3384 wrote to memory of 1948 3384 msedge.exe 83 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 4860 3384 msedge.exe 85 PID 3384 wrote to memory of 1200 3384 msedge.exe 86 PID 3384 wrote to memory of 1200 3384 msedge.exe 86 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87 PID 3384 wrote to memory of 932 3384 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38e038567052548f64c957e02297ef81_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc068446f8,0x7ffc06844708,0x7ffc068447182⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5599131128087298516,9529610143776332761,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5599131128087298516,9529610143776332761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5599131128087298516,9529610143776332761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5599131128087298516,9529610143776332761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5599131128087298516,9529610143776332761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5599131128087298516,9529610143776332761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5599131128087298516,9529610143776332761,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD51389a50c8a9279b6174d90797e1e9dad
SHA19a56d01fa8a2bf1c56ff637dfe44045975d4b7cf
SHA256c74b06ceaa3bb57813948341e420e025801a02b2a1513afdee1c76f8006d310b
SHA51270185695f6a7641f8cc0095ebc005a51c930e201dd886b02f667b783abed83452db743b26bd89fa958e8f9c0f838580e5a0b2c575ce1a82b42c9ff12804a2c92
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5b364e310c806682698160b249fe1b1d1
SHA176d0d8922283ee5ef13c2e26b82f07876d48a474
SHA2564bca9a633c1652d6374b2b441aaa6b537b3f35109d9663488f515985c4ece622
SHA512cbcd2401c7149d56938952a02660c940d627a4230a2fb319b91faa300af3ec3a76877b1918921e627bce3fe14c72f518ca2aa9ab399b824201a2aec660c18e8e
-
Filesize
6KB
MD5dfbed601ef6b4286aa3ea418abeaafa7
SHA1327e9948d45514b7ed4d779a694c03cf091708d5
SHA25660a16fa6101959d2bf536624b903f6335b0dce8b529abbc05bc70c952cfcd52b
SHA512513864db1a02daa58a209b78f0a7fea91952281d1c239599c8763befdd959dfc9a3ff3c6122ae4b0a1b430431df7f9f3ac860692fd8596d630abea9c4dccf49c
-
Filesize
10KB
MD56b5ea050fb55439c2f1a88627e58178e
SHA153d3eaec5de046447b393adbbf23b09f2c0f9b9f
SHA256c1d9450d914e96ba63de70ebe08e8b18738eeffab23e5f30c9e1647bf28ab8d7
SHA5126df0d07b672f19b2f852270504ff3f7b588083955cc42686a2d8df20d48aff1570cd94772086e1f3ab884a1acc6f92c136b9b0a00b5b34972ea0355e884c3d35