Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 02:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_698e966a48f61dedd47a678efb31b5a0.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_698e966a48f61dedd47a678efb31b5a0.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_698e966a48f61dedd47a678efb31b5a0.html
-
Size
87KB
-
MD5
698e966a48f61dedd47a678efb31b5a0
-
SHA1
bdfcb8dfea6b300ca9aea40cab8cdba433be7393
-
SHA256
44e945a08ebf46280abbab9d2ae6a0907600a38b299f7fac199b2824298d141e
-
SHA512
0f31546cbed89ce86777b32402252dc61642bad954656bf3f05f69749ee8db7e81c403d06d8bc5192ecd6c85f8a4ba850637bd37d9e1ccb63f62fc793acdb210
-
SSDEEP
1536:EirO/gffrJPiaSAM1viGX1PpV84yhbsTqWvtylUL:nDJafAM1viGX1hV84ylsTqWvtylUL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3304 msedge.exe 3304 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3304 wrote to memory of 1924 3304 msedge.exe 83 PID 3304 wrote to memory of 1924 3304 msedge.exe 83 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 1832 3304 msedge.exe 84 PID 3304 wrote to memory of 3548 3304 msedge.exe 85 PID 3304 wrote to memory of 3548 3304 msedge.exe 85 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86 PID 3304 wrote to memory of 4652 3304 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_698e966a48f61dedd47a678efb31b5a0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb315846f8,0x7ffb31584708,0x7ffb315847182⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2269042750982318995,853014569100379401,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2269042750982318995,853014569100379401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2269042750982318995,853014569100379401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2269042750982318995,853014569100379401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2269042750982318995,853014569100379401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2269042750982318995,853014569100379401,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
797B
MD5411070581cc483cb827cf2ecf24e288c
SHA1e80c1f49f9c23b4543a02a3092cf11ed3627a495
SHA256f78f56ab19767a09c6dcb1056dc1148ca3cef05007300ae6ff1f2649c17515cd
SHA512e55653607354d8b5d47c4a26cf03135ce1c435cc092f081e052becfa841e87e1fb878718b4eeadff45fec98f81702b0b690092da37fb488276a0a75f8c6876ed
-
Filesize
6KB
MD56c61e2a282775039635d2125b041ac8c
SHA1a00713655ba5b4446762e722c1ef8260e4f74309
SHA25692f1707942b845d75113185ff2acff2f9d95744cc8450146e94bf88f1786671d
SHA51249303c184f7e072cb6d1036478d0b9c1e2b42564577c9308f3ab536aa20900ab53e51c3702bc595406d0046c0c9316a890924490b2ce2ce2dbc0ec17c8c67e8a
-
Filesize
5KB
MD5234a62f3176c70b1699ae8a3c2a897b2
SHA1d749975628a68949847b0ee6fe1316fea6a3256d
SHA256dba1f2639d2efc4d0bf115613bc383e0384f92f4e1b6a1be6d5ff766c5ff69d6
SHA512ed0243bd2fe1237e5edff643506ab41c3c066e0cbc4c1580b34d88fb721e98e3b55a48f6a75fa7a1a5f3ca4d4f6bea3e2e2fdd260e38b2a5a33181ae349e61cd
-
Filesize
10KB
MD5a7ed3ea9eedab766fceca719c662605d
SHA112bf69b9f34762ed9616d7f21551f0597bb750e7
SHA2567fd4d033105293d69404c61944a69f1c643172c8d0f9ba1dbcb4a3b4c3e3fee6
SHA512debd3c0d474125a961de813302b22ca7a4115c5bc9d2d2eb48627d4c3b659967ebe915e6c032e5d78f8dc3344b5c02139bd009cc0046219b822c139ef37e5e7c