Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 23:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6149f9f63d7f4c1bf629d51b47018146.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6149f9f63d7f4c1bf629d51b47018146.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6149f9f63d7f4c1bf629d51b47018146.html
-
Size
84KB
-
MD5
6149f9f63d7f4c1bf629d51b47018146
-
SHA1
5a600807895ed1c6513f34a4b307ec8d65309785
-
SHA256
b1f31ddfcf92547888db28725556a90129159455bcdebdabe8ce233b688193f5
-
SHA512
b06bb7be83f774329468aed96c3010951b881087a92a9bfb366855cc8980958ced2a27be698c369575c97a01b337bbd86219cb1441793e19795c792b50fa97f7
-
SSDEEP
1536:Z55g+xjv/XRyGXmNJUzIfVZeDliFcCHPbkwPYMorHi4X9bAb:Z55BxDAGXmNJUzmZeDliFLHPbksYTrH2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1288 msedge.exe 1288 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 4016 1288 msedge.exe 82 PID 1288 wrote to memory of 4016 1288 msedge.exe 82 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 3640 1288 msedge.exe 83 PID 1288 wrote to memory of 1700 1288 msedge.exe 84 PID 1288 wrote to memory of 1700 1288 msedge.exe 84 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85 PID 1288 wrote to memory of 876 1288 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6149f9f63d7f4c1bf629d51b47018146.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8e1646f8,0x7ffc8e164708,0x7ffc8e1647182⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2083925152938087559,3359175821234660611,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2083925152938087559,3359175821234660611,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2083925152938087559,3359175821234660611,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2083925152938087559,3359175821234660611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2083925152938087559,3359175821234660611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2083925152938087559,3359175821234660611,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2083925152938087559,3359175821234660611,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD550aba84e97edb6301988e7332f474657
SHA1928361120fe32afedb5128906152310d5ff4aeb6
SHA2561de5ada259366e98038f16ffde77b4d5e65f979e1404670b799939b0037e73a6
SHA512cf44438cb4be6e7d0199ebb213b2ff8c6e53084d8f21bf5c17591a479fc90c072404d9f3444f3159fce8dd8281a64750c40b598cc24563f77710331862150206
-
Filesize
1KB
MD53bda85367b2f8b6a3de4702e0b5ad159
SHA1d8be34bae1c801bbad3066a3f9a906d06432ae63
SHA256ef10c7c296de967267ea39e9bfa4b1b51893e2f20e090beb8e482a79cbf14275
SHA512d1a29b148b082f4532e343031de0c0c44efcc8b8e3de09d6a66f9f8d1ce74643cda92468ec79e963e9a576268a933b3a083dbb0a78e309a1999733710f8beae8
-
Filesize
6KB
MD52307ffffe308dc3e391f55697d905567
SHA1611e482dd26d5370b267a716cf8b8448d62e3a96
SHA256943bd6c8660f9b34699bb2f36be0627ae96276417aadf29ba2c3a94521c5995f
SHA51285236ebba9e06bcae12be2183fe489f95d501587a4bec9262846afe95918bfd34519a4873301390e4559c3f12d3c569aabd559bf9cd4bd3423face132a53cde4
-
Filesize
5KB
MD5322ae644406599a2fa65b0e80d30aeef
SHA1042e7eb590d45560e9566157c6362abaea5c813c
SHA2562f21213ae87139cb9937f8f49d62984f6a865692b225959189a577f782707d13
SHA5120647776bf20416c92143583ccafccaf51782cb2677512f5b44af3f169aaa10fcb2b31fb071dfd85d06bb6650f3df8daf3758910526c55183bfae8c10e99b4692
-
Filesize
10KB
MD54948c54d8813b4bde4ab006d8af855b7
SHA1af854ba9d97f2a971056f9812722271ab1bac7fe
SHA2560e71c1461cbed7b1080b5e74876c7c19480b53282097cd292a3d813f54615060
SHA512b1b742f5a1d77106a88aed5ba82888e9919b4453845c99cb8aa215a9a68237a57e5ecf2832c22e02140abbd37c4dd0f485ace2b0172be0ccdf386f8792e31cc0