Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 11:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_532a147f7e414419cb5398d1b34696f4.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_532a147f7e414419cb5398d1b34696f4.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_532a147f7e414419cb5398d1b34696f4.html
-
Size
107KB
-
MD5
532a147f7e414419cb5398d1b34696f4
-
SHA1
20c69d7a557e2e62cf44761f4bd2f9296e250507
-
SHA256
9a2787cc4694b2ca2e22f655909c6892a68da9d546cbaa84e7dcef68f4e7cfbb
-
SHA512
20854ef498473011eb8215c7d2b3cef8021e53cd472fd42f4d04de2591e1c854d569ec8e5e390cc6b2e33325c681fa6f2fa6aeee412b26c9350832738237970f
-
SSDEEP
3072:aVZFICUMKh93/nnP1kzEDM8UyKNHV4grcAydgUzE/F3JceCfPUMn9K:hh93/gZ7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 3128 msedge.exe 3128 msedge.exe 5048 identity_helper.exe 5048 identity_helper.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 1576 3128 msedge.exe 83 PID 3128 wrote to memory of 1576 3128 msedge.exe 83 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 2160 3128 msedge.exe 84 PID 3128 wrote to memory of 1732 3128 msedge.exe 85 PID 3128 wrote to memory of 1732 3128 msedge.exe 85 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86 PID 3128 wrote to memory of 4992 3128 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_532a147f7e414419cb5398d1b34696f4.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdac5c46f8,0x7ffdac5c4708,0x7ffdac5c47182⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,15769885566612717686,11685651194912519627,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5504 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:60
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
498B
MD5324a2a655fbb3a88abdb70a6b0d6ba0f
SHA1906c342fa1f9a31a945a69b1c62a4929989e24d6
SHA2568dc7ad179b5faae831898031c3ec94d488037db72530cbe9f5ebfb4fae92375e
SHA512045f504a876cda6f63215fff6454fdab50012f28710e5378dff97d838b04702710fd7302fd6b767618a8e49516072a3496daafbff93b4b576d0022c36fbb3097
-
Filesize
5KB
MD5a112319bebdfcf69499189618bb709d2
SHA1c420d4afc9ffc77639ee98c2be09e77531421de8
SHA2565e9bba1cd11ebf592956248ebcd324b569bed4874290391a4a57923a4f109284
SHA512a42d006c78b62ebf20fb3a8a0885225868ebee52a7beb40839bf49e98efefc3dd222c039782a0d173edd17e04f39db34900d7449c8d2f0a50d17874c16723c7d
-
Filesize
6KB
MD56e8403be22f1292463664a187b460fb2
SHA19f7ef700f526f8aece8e60505d3db0ea9b95b23a
SHA25645498ff019a9bdb6af4adf69733aacf6dd9b65003826195aaaafbe8f67c89c7d
SHA512b1ce33555dd44a8b8187c1c5f02161a6cb2fa15971071ceb126fc7cfccdc3375912afb579443610bca354b4c79683d42a7bc1fd831ca5ff58c9f55be449d814b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f1dc220cfb3a3f4d1da094591ca0aab4
SHA1080f4a78e761cef6cd94b6da573404333e0c1bf0
SHA256b6322e36a981dc4a27d92608e66321c6fdf03fad8f82f6d28738297cde4e780a
SHA512647b35782061ba90e0f5a7e2a73dca0bb72532e95ad6e427b337dd300db7d0e89d0e7fe35562cd2333675482b1410a6fac45b8d03a455eb8e0897c66135a6bb9