Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0281a2f7419cd613c60370154e374cc3.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0281a2f7419cd613c60370154e374cc3.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0281a2f7419cd613c60370154e374cc3.html
-
Size
113KB
-
MD5
0281a2f7419cd613c60370154e374cc3
-
SHA1
298351ac1b9b22e7a3c19a51ffeab2c4a89d3591
-
SHA256
7944024b4ef619e094c1d49e8c9a494c371d8d89a882937f64ed4290eacad685
-
SHA512
a3caf91f286832e11d521d26721e6968d890c73ab7a2cd01c349d7c3f0e675ac80d74c86c92d4baa49ed5464be3f00f4e443eb4ce78c080ddb71c2111d9a2bb9
-
SSDEEP
1536:bZZnLK7fumyQtihT9BRuxEez7wy5YWfewmyeVFAevMGrtKd5yrJlPK:bZZnLK7fumRWXuyez7wjWhmVRu5y9lPK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 3296 msedge.exe 3296 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3296 wrote to memory of 2360 3296 msedge.exe 82 PID 3296 wrote to memory of 2360 3296 msedge.exe 82 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 3168 3296 msedge.exe 83 PID 3296 wrote to memory of 4464 3296 msedge.exe 84 PID 3296 wrote to memory of 4464 3296 msedge.exe 84 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85 PID 3296 wrote to memory of 2488 3296 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0281a2f7419cd613c60370154e374cc3.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc46f246f8,0x7ffc46f24708,0x7ffc46f247182⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,15385316858512447080,995111134158710027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
21KB
MD5d75339be22af589565c767de9c8b83e3
SHA155f480ebc8615dfd21b0e394fc6fc20b60111c2d
SHA256c93aa4d94342a058e7a257771cae2bb787231b25df4c49cfb00f1386dd1645e7
SHA512de09168dc6882cb38a0ea1b2deb7ce31e871d524fb4b53d20bdf71d33a37cc5fd6c4b51939d99b7a9de196387de71dc06ce28d2485e37bc8b95be6dc511bedfa
-
Filesize
41KB
MD51da8deabd421929fa1a865599f43aad8
SHA188af7573c39022643333f85b523a329cb6448675
SHA25607b01330c36ae322ea1f1e2ea70e60b629b292b3f7ee7aae5a9968dcf341e685
SHA5120be3f8d02397c3cc32164b116c807115c42a310fd70c72c94b3b523732422ea2b222d8762e81d91ef0c36a8328df4f7ae8e4570c4bc46ab94cbed5131389ea3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD52e1c8fc32d56b9477859500e464ed1da
SHA103317446b0bc3c7abb9e676f3623fc300819cb29
SHA2563e7bbf157432fb0ddc656af355df0d1be9a69868930b127f5443620c7875066d
SHA51209c61c45a60ab16b25bd54246b00b0b1a844e1abef23bef68bd162b5a590a2b27aa626cdecafd7820a28a67f9d126019ce50ef77970e6103474450a9f94b2e73
-
Filesize
1KB
MD5af1d7f65033f2884fa8adfc32ffc037d
SHA1f1e4c4c8696a3c2240d4ccfc9c17cb638494c972
SHA256dd64b7cf68e6c3b069ad2cce0d99cd2806890d837ec0b0cbd760520d92ca53d9
SHA512dcd3104ef81446701ef2ff100011b142230a72e3ab0b79a6b226118d23d72ce960b051372eef97009b7da09c42d3f65518bffc2bc6498067b84cbe6ecdc71814
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD552d92d081bf9f91e5c4f0deac2ddda59
SHA1719eecf80cbb3cc656de222060280cdddbb0f134
SHA256a244cd65ef08396cb7d2188959c07d3d37fef3beab4b5f43c53e2221ffab4486
SHA51270e45112fc4d9ed4a6987b51dbe331344b485dbfe87e081c6f11fec86f8488b5f86ce6da1a6307faf5fd3a8f2d938da6d064b6b020c502f9ce50d8da8c20152c
-
Filesize
6KB
MD527d62ca2046418e49a73ac81c9402213
SHA15c8f291e54040d58a5fbb81231b5b94964270383
SHA256c6ce6abfdee7318eb94194a64f09aefa4136dd8b2879fe6e114176cba21f375a
SHA5128e8ba2c721a7892317dd871de02a3b8ffc41b5aab736819350bd59cf81cefcee9ab6dc2fa72a4f67eb132d6761b0443d3f2b3244b5b4c3761bb3e812cf084ea6
-
Filesize
10KB
MD53b18e006ee12c717248df1e42b96bfa4
SHA18d74967c0a34ce1af964cb838b46ba71b9979a4f
SHA256d7c13006115672b61a69e158855897e3a70e271d7212650cadaab16fd352961d
SHA51283fcc93f5a2bf18b3465c3ee30c19ec2ca8885a6dc9f5a8e1506e91dcf96ea72b62cc4072d7944e372bf3887c8c4248ba40fca3db2a3b18ee93252d0bf95682f