Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 15:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_59dd2349a30abf9a19f167b4e2fec975.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_59dd2349a30abf9a19f167b4e2fec975.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_59dd2349a30abf9a19f167b4e2fec975.html
-
Size
78KB
-
MD5
59dd2349a30abf9a19f167b4e2fec975
-
SHA1
cfbe06a877709cf09ac67a70761128dede123bbb
-
SHA256
0331bc8bd80e4ea91a75c7915fea88cf8f501a002723f0de0a0d751fb265d38d
-
SHA512
6703fefd7eb255cbc384856d575fcee27f7a37d1546181c96126deefc2ed3a9f3158d6c76f80267b3ea5357ed456d5ba3429b4a2bed936a7596df8b1cdbb2dd1
-
SSDEEP
768:2EgKyyfI+tdlPKQSrun1QLsxFHouazWG5RDgmyMfGlwdrL2EO:snyfNdlPoun1lxFouazfxgmVfGlwdA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 4244 msedge.exe 4244 msedge.exe 1180 identity_helper.exe 1180 identity_helper.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 1016 4244 msedge.exe 82 PID 4244 wrote to memory of 1016 4244 msedge.exe 82 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 980 4244 msedge.exe 83 PID 4244 wrote to memory of 1548 4244 msedge.exe 84 PID 4244 wrote to memory of 1548 4244 msedge.exe 84 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85 PID 4244 wrote to memory of 3640 4244 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59dd2349a30abf9a19f167b4e2fec975.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb89746f8,0x7ffbb8974708,0x7ffbb89747182⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7112 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7132 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18127941485484619090,7630364324096622910,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
1KB
MD523237caa2e1f4213309970a73d95f202
SHA1074e8c0ccd9d6f020659bb2f86f0cb95a70ed5b9
SHA256290dd6c628fc683c3ac014602f0fc354d9c87b26fee5946db124239b96f69d5c
SHA512fb7176cbbb2f809a94807c5fec134e2205942062d30254e36d493ba62facf28bdbb45e549d9a4285473e6a6c08db6adec088f6750476462cfe1d50d0fb206ddd
-
Filesize
5KB
MD5116c5c98c3312bd40dc7ac226b62faf7
SHA1530be8bcce9d573c956fa8b28cbca1f1f3b97fb1
SHA256961196076417676e2ebfd8e3ca7e04bea83cc0fa93476c9b8afbb5d089392e45
SHA512d1cac46a6cf35f455848a3e7654fae4bd285fe1c348cc4f3b395cbd64da2bbbd152ba3de0154ebbe0a2b25a3157716833ee0c8275c924e03b68dcc6a03ad7171
-
Filesize
7KB
MD59ebb3d44a4bda223a95b4185af04bf69
SHA1f6e9ad676458e3e8830f8b95c664028bc2072eb1
SHA256ba2d930f25fb9cdad9cf7022d1ea651f9821e184bdab911b625375f801831cd3
SHA5128c33e77199d424aa54f0c4714153daf073e97de389f6bf5d6f5df54e1c7e88b47387d42cd4d6f7f77612e1b54c6a7e82f79c79269a69f8da8c2dd56ae34bd505
-
Filesize
7KB
MD56904fd05ce3d6cd1d4adb5a6b617b8c9
SHA175692534e1bb6752c0e0f44a9d5e4bb78d4b7b72
SHA25613528ec764a7fb4678f16000b6744b8e7ab286617bc9ded7aa2db6067e29fa05
SHA5124a3684459e4dab75ed870c0a7656ac1af6f5a3750a784389f07fb7be5f06a472b44de145374f5fc4daa98506ba4ebb4e783c13e8e678e2242d8b0d4ece807bf1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD540d360eb13f4370660e5782b802c89ec
SHA1cf84e04cb3be327b2dc9b4444b609c894b56fc81
SHA256de78e455f12b53a42e337fd0ef5d7aaebbfbe0b37799c480415fe970468fa5cd
SHA512e10913e983d91ae85f417a6733cb03043ccfeb6cbe3edcc58965ba2d51efc4470ced27c2bf00dd0500bc5509735477d28a575db34b3c1f981f29b70e049fc0e5