Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 10:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5227cbd0b36e6872ebd0806b8f919daf.html
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_5227cbd0b36e6872ebd0806b8f919daf.html
-
Size
28KB
-
MD5
5227cbd0b36e6872ebd0806b8f919daf
-
SHA1
80dd66cae3c1cbc21cb0a7d5b45f6c0690873923
-
SHA256
4c7908eb955aa96ce7b0158ab4fc8f80d9d55666359bba41de3c719f4ecf50ea
-
SHA512
eaaf97d3db81010203224768d5d7e34744a33418bb426579c5a420bbd1f98a7de29ce2d2fa0c13b58601467396afd29247f8edd6d7e7af384a102d35b376f5e0
-
SSDEEP
768:PtZRsV2+63kPENbWJZYDN4n+Gy1JlwswWuR:1ZRsV2+63k8FWJyN4nB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 2528 msedge.exe 2528 msedge.exe 684 identity_helper.exe 684 identity_helper.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2896 2528 msedge.exe 83 PID 2528 wrote to memory of 2896 2528 msedge.exe 83 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 1524 2528 msedge.exe 84 PID 2528 wrote to memory of 3656 2528 msedge.exe 85 PID 2528 wrote to memory of 3656 2528 msedge.exe 85 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86 PID 2528 wrote to memory of 2848 2528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5227cbd0b36e6872ebd0806b8f919daf.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab24c46f8,0x7ffab24c4708,0x7ffab24c47182⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,2579560102003962239,15225282920781367950,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5512 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
602B
MD5bf7234a39494a8b40e74d8b3963ca7e4
SHA10e2f8373e13254d73d9a5b95ef73abb7f660dd2b
SHA2565fefcb311f2a0484e985ae47a355a9b97a501fac1c69c3bfb5854987f6c19102
SHA512ceb6087e6d9f24727cccc458b5d4688f7abebc9c3070221e48941123cda3259ed4770f199042db677ae862a463a3b050511df2e998afc6ba128eef461c356bbc
-
Filesize
897B
MD5e3dde7977018e0b2802ba43a962b7735
SHA1ed1700af922f36ef45dc43338be710b34621159c
SHA2565f60c7e57874f3c4c3555fb8754acd58fa41345e78e7d8eb078241991f8272af
SHA512cdb031a4b49aa032c67ac2d1f6d4e1a73fb416479618b8424bb2489c2c6f3f861a768a88dd1c4b2991c011a9f059104736ce43b767c1a298308df52bfbca7d39
-
Filesize
5KB
MD577e3d3e979f875f7fe85e28c61bf0601
SHA159d38c87dddf843030307a60bf649e4130e22dbb
SHA2562537c154989ce29a4287bfc2e0aa7f39e2f89cd67e56b078f0fc13fcc9635f3c
SHA512f259546f73afa57e1a3780d68f8673b755e0643e90a0f7e0dc77ec1ecf32cdb548af62120a2a56677cd5e5cf80fe1253e7bbc1d002ce6bf9b43a0149eb6d6733
-
Filesize
6KB
MD522fe4dec2ffdf59cfd2ffbd23e25305b
SHA1ea456217c2636d4f663c1fd23c92739276fb67a2
SHA25630d68016ce7efa9f528bb03ce3baefd9acd259b395e343f019989a399997a55f
SHA512175bea22264efb91fd38f4f988e155289c235dbfc5501929ad629c3078106abc46ea7e54e2c487c429e8c8fb1add79ead4e9a816951b2b07dde2d7ff706da01f
-
Filesize
6KB
MD538a77acc7b09a3c5cf6bad749cefd0bc
SHA1ff0fb04c2f54c9ed61c6084eccae0f73bc455b74
SHA2569f2f0535896b5e2761629379f1af688960e9fa83ecbdfeebf1f033e00bb688ce
SHA51251a564b335713610dfd0314b4a655829b62fbdc25714addbc79191b5e1d89e184b58a8cbeee5b3b4397ebeb74ceda0a1c8edd7cd149860300f7e40631229c705
-
Filesize
203B
MD5cfe066ad145e3090fb877f6d3d0d70c9
SHA18a3657bc80d39cc0b050b24dc45d975ce4c52da1
SHA25600e9c344addc8d3039c4e53f0084f11e4d0ffbf28187855282ebc8caeabadf9f
SHA5122c3c02d1215c9eda28eb39ae8308fb2dde542fcbf6a00878cdcbedeb84c375033f0c0ca40a341f655a139777e5c48620b1d1c8a8e967e125cf68dfd51e33fa5d
-
Filesize
203B
MD57e841c018798a80db2cb25c762c79980
SHA13f39b2d3e293c50ce09d6010d5c3c4b899d82a9d
SHA25624bc5d2f4a1012e3df9d5f914e5338ffe0554e894b22cad9d214f25e9191571e
SHA512b877db5b4afc598cf2bd5c43da60e9fa85a25cf0587513c043a7e1abd5ac9767e29e6460ba9cc9263f6e6f1b0ace09f22a602dba798ae857bc3e19f7ef81cd1d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD556a181540ac20005b154b468579fb2ea
SHA1abcc8b2d4529ed6af9b34636e100b7e05533d7d4
SHA2564f36ecbf83df2930c1e2b72dfeaa1fe960fd008d657034c90ee3e0e0cea376fa
SHA512632416664c8695d0ae7fc0ea68de37780aab3129016474b2eee82abcc97ae20d663f936ab6ef3bf43171f93eb45b3ed4a813658a9489e9b48fd26ccd60254718