Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 22:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_72be5cdb95152cd2fb5116035f296759.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_72be5cdb95152cd2fb5116035f296759.html
-
Size
28KB
-
MD5
72be5cdb95152cd2fb5116035f296759
-
SHA1
5983a87a601f537745506cb5b0a93a9bd67b2ec9
-
SHA256
4cfa0a524a87e3436c06540d1cee16a92879c8a7c06dbebf336597798ca28973
-
SHA512
fab833c22e100a2c2135c0374fb089d26cf57ea75f41f7ff902eb2f94ebe3bfaaf61febc17a7a592bb836df418baf85a0609685b45bc5112f72897a5926f4154
-
SSDEEP
768:PtZRsV2+63kPENbcJZYDN4n+Gy1JlwswWuR:1ZRsV2+63k8FcJyN4nB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2280 msedge.exe 2280 msedge.exe 4108 msedge.exe 4108 msedge.exe 2236 identity_helper.exe 2236 identity_helper.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe 4108 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 2896 4108 msedge.exe 83 PID 4108 wrote to memory of 2896 4108 msedge.exe 83 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 4216 4108 msedge.exe 84 PID 4108 wrote to memory of 2280 4108 msedge.exe 85 PID 4108 wrote to memory of 2280 4108 msedge.exe 85 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86 PID 4108 wrote to memory of 4852 4108 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_72be5cdb95152cd2fb5116035f296759.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3e7f46f8,0x7ffd3e7f4708,0x7ffd3e7f47182⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8296602396538131662,4074637667573842525,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
897B
MD508f16bb2c4d814c56ef39eaea0c99630
SHA159ba179f65a978aa9e682d57a06c1f1b7b5ec5b8
SHA25659f58c803d52ddc6a42bebf99e927760d52837ab9f263adca055990725a639d9
SHA5128d57c93101aee285db2f74e28cacc4e74f153909de7aab96fe6657de3e739f218c4c12ce4f248c24564ad66a3c118e6506358678347cf93240219886b48eca90
-
Filesize
866B
MD57159d9a79c190db5141146bed61710e4
SHA1440cf95759c26fb808f4bf828798dec67cc23941
SHA25615f4db0892373998e7b541b2019f4aeb20f1a5578c3f9ede07448c3036a36214
SHA512c587d4b77373a4a94b66b9a5b822daf3033a8ac056c577f97e3f8d4ba7ae59cec4e01fdf855a277900e14c5d1b56b8c5db6a5aef2ca16b96349ad4daf3de3fd3
-
Filesize
5KB
MD5d9b2fb2d074e596fc7d7cfbe1b00f675
SHA1d790963bd68fbc3d68041b9827c3396f25020fdc
SHA256f958eff0c8ddc248722416deecca106059b40735d3c4939786de6bbe0c5af38f
SHA512208195708ef9860ec758df434bb407e1a893e323925baff9d710b576ea8611572ae0e95f306f1687507b5ab8855731345dc4d3c21d0167cd87c24e4612658705
-
Filesize
6KB
MD52a105c1668c02c75cca891b660a35f8d
SHA19a83ec3be8f0271d33b731a3a8921ac7c717e8e8
SHA256d3448e2046766b56ee30b7cd097cdbe5ed3c50dabd6f5921bd5218517abf9114
SHA5125b5e70da1ac0853eb6c226c4a2ed09f9b21954d226381fae481fe11ff4cf069803ec18f346da8770c9a81b830e070dfb483eb4bd937faab4026c4ab1b77d2db6
-
Filesize
6KB
MD5f87a46472048340547b7c72e157c8f10
SHA1c59dae8511bd52b0d2d009b4d563508cc95e1367
SHA2561d56b9633171a5e060d15ec81cd13dacac327bb1992e7a4b313d8cbf6c505087
SHA5127b6c8730fdb43e8f79c96efcd4a3ab30408fdb451d055b59d9f5de6b9e813e5e3dbf15ef32bca1a08417a86d8523d6c50fa924221385c47d360ca65fd92b1468
-
Filesize
203B
MD5a652e685a329afb535193065523ba0b0
SHA1d47f70bd759d017273eb3fc051008cf05f283fb7
SHA2569435222b6beacacadaf3cf076eb22afe5ca8ee83b035260fc79de8ebda85295e
SHA512dc34d66f4994c47dad7d7e4ea6a0546eb169af2c4379959beab3228ff2135e54e8e6a24cf27a5d704e915b5f8439837172724bdab97304ff748d342f843a2b82
-
Filesize
203B
MD5632bc2cde702f58feacf48ac490c63ee
SHA175db76d7640cf28ae64b34b625631d9920337ece
SHA25634d7933a262c15494db8a0bfa1267bca37f2cdb6452674c2fe132562fb2309ca
SHA512e2c5053f7e2fafe2b8510fa46d3bedfe35de1dea6dc64506f88928fa225c937f24e3b7fe07be47e1db627f2b7298605b7c991ef1cf68963fe072a57e05e1f3f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56d437b613cec1a4d0d64f71b6f17bbac
SHA1bbbfe5650b4dab87556533ac12903028c11ce83f
SHA2566a6319732af7332313bec061cf08b221e179c07033b268bf30b26cd8986dd814
SHA512bbbc94a3bc25094dc3f3a611901eae9c72dd70e1da2420993a0e00c8f531bab4c5e262329fe121f758bc633478ae0108eab46746bb606f2daf3843a6a106da6e