Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 19:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_604aa5000a81f77d388af6a324c295a0.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_604aa5000a81f77d388af6a324c295a0.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_604aa5000a81f77d388af6a324c295a0.html
-
Size
104KB
-
MD5
604aa5000a81f77d388af6a324c295a0
-
SHA1
e8baef369267d46fdd8671b499747b693b85b991
-
SHA256
47b7e2a7568de4e35e391301127468a11c9a90c1fc27369bd21baeaa9959417b
-
SHA512
570bba40c4386a6eb101f19b5af47fee7302eb9be524c6c49286431c09f312b5d575a925dea51d9fbea73fae81cc526e3652282c189f632b17bfb1ddc19d4b06
-
SSDEEP
3072:GuDnfSnIoEVyAJlPItj+9j+wqgRVU1mtqtDzz:GuDnfSQSLz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4300 msedge.exe 4300 msedge.exe 2284 msedge.exe 2284 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 3332 2284 msedge.exe 82 PID 2284 wrote to memory of 3332 2284 msedge.exe 82 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 1664 2284 msedge.exe 83 PID 2284 wrote to memory of 4300 2284 msedge.exe 84 PID 2284 wrote to memory of 4300 2284 msedge.exe 84 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85 PID 2284 wrote to memory of 4992 2284 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_604aa5000a81f77d388af6a324c295a0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd446646f8,0x7ffd44664708,0x7ffd446647182⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,4170420353613573412,9800379353809293520,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5bdde7bf66452a0d3a8b14d675f7f6a39
SHA1401f55d09166546d6cd28ced50d1cba04b97f735
SHA256bb461a9da7d13569be7b6c78425ee7f6337aee00c23e668c8c7e65be5760e2fb
SHA5123aabb22dbce278be37e8daccf9b8e5cf0cbca1c0fa88ba51816727d24b4355c570454370b912324a46045408c334387bd40e4c7cf6c2c348bc0dd78937cddd26
-
Filesize
943B
MD540a41f3a5b8ffdd9a287ad4ddade5259
SHA1c9ade6e643c97e528aac4082d657d4cbf1420ff8
SHA2560a161cd4722bc79edbf63fd56b0dcee1afeb50d1305f25722d8744c76abd9137
SHA51221fc137b7432f4fdf3649dd380111316661357b8331c83112cd9e42992d4424f2dfff16393729de73b12a3ee249024e9753abd1c450f2e81eecc9724b9f8cb20
-
Filesize
5KB
MD57eeebee741e28550cf99885a3a631a09
SHA11094040df2ae904fe9385bcb54c2a567b4ad02ab
SHA2568e4e1e884f267a90266c4941f402977021c0b945dac41258de1002ab6d839100
SHA512a27645ad437f3e0906fb3f3e6e74884f1b1d865b05d17fbcf7cc2d55debb739964164a995d09731f15ec5a0962fcfc6a3e8ba872a599f5c3e3afcc0baa5d4c23
-
Filesize
7KB
MD559a373540b7820e70b2ef8dd6f8f9478
SHA1a225182f5cbcbb1b50571b5d6e35274d5959a232
SHA256db2b71889022323fd7525b2ce0f649589d8ea097c3be9e73a4e4297b28f7495d
SHA51222c7e6c7f6af461ab22033e6bf2183eb1ca91880f3c4ca82711997f712005106a37d43ff6a0cda615ceb5dddb7ff927d95f63929a1c0b0a17e4fc921ef552a1c
-
Filesize
368B
MD52f90ebbde39f457cda81d789a61e0242
SHA1cc3287437b9b13f1b92a799ae937c49c05cc612d
SHA25600852aaf32d32bdabc28e98f79f7a61fb96683e5f4997c8a482b15bb4df723a0
SHA5122b1f5c153e48e55a30665bb292235f505c15547655d9c91c793064b9a1fdf1b1ffe38d253924d75321cd23c3da335c49ed0e8cfad27a8509c059ec1fb87a2786
-
Filesize
203B
MD520ba79181627b481bf9a268f1b318d59
SHA173116cce0ba3a0fbd4dbf23c97fbf984f1036afd
SHA256d0ab463b84f9e111baac0efeeac5b3f3b699ee82c7a267f4a8bc1bf06d275fe9
SHA512b659ba35243d40c6c31b660825b2fd55a260aabc6e458a6daeace8a2cd5e65915777b77cb3376e41ed46b7684c992d4f97ffb15387c4c21cd3cd383c86a04ce4
-
Filesize
10KB
MD5ac81cd5363f6fbeda9065cdd38d87626
SHA16c1f48650ce946e9d96e6f8a53817ac19888a6a8
SHA256abc392f78bbcd4f877cd0b07ad981d09f8f07bfaf551d372203f0d2c47c13a77
SHA5124016e5b2165d4f51b23bad311cc1c35089e0c9632827ba7d53b605e937c0aa569963e95382cec38981e23f295d722a4ee71d44faff4b057a1297a92dd64e3c20