Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 09:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6bd2d5796325343928fecbd9570c4a20.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6bd2d5796325343928fecbd9570c4a20.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6bd2d5796325343928fecbd9570c4a20.html
-
Size
374KB
-
MD5
6bd2d5796325343928fecbd9570c4a20
-
SHA1
814d7963b7768d8d382037bbb9ecbe5c9ffefe43
-
SHA256
3ce151f30297e7a24f814ddd6df355583c2117adb6342efe2e6cac90c56a5f43
-
SHA512
9e732fe34fc1715fbe134ebac6d587b7b7f412ccd8d8b3928561995c19bcdd5bfb99ec9918616613c56d0bd326317cb71507a82c519527998b4296e0acddbbbe
-
SSDEEP
3072:B3oiQe2wSFuwx7uepMJ+HLlnrvenmTX3kMkvOiFxpMOqgqbr65zFGZuC3Aa6A+bb:fnuXrSAU6ZFZG1v0s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 1488 msedge.exe 1488 msedge.exe 1568 identity_helper.exe 1568 identity_helper.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1824 1488 msedge.exe 83 PID 1488 wrote to memory of 1824 1488 msedge.exe 83 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 228 1488 msedge.exe 84 PID 1488 wrote to memory of 1956 1488 msedge.exe 85 PID 1488 wrote to memory of 1956 1488 msedge.exe 85 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86 PID 1488 wrote to memory of 2592 1488 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6bd2d5796325343928fecbd9570c4a20.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad17946f8,0x7ffad1794708,0x7ffad17947182⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 /prefetch:82⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6906956344554605701,5962799529268479614,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
855B
MD56a1b9e8dcd1e24e36daff866386290a2
SHA18843e22ef55ac427a64893ee13c0eaee5fd09078
SHA25682550c9a70dab0beb85c191531f5fa716e59babe58292dcc4f773af50e12c17b
SHA5121a3ca7a6015d0a5da0f9daa66cab4dc3390656ef8eb5fc9cf5e968815f30d28324b87d3dbc1e2ba21b1e38ae4d54ed3b594cda4cc05c2cb234246b35cb58ce6a
-
Filesize
7KB
MD56af769c8aeb86b43d02f6e699fc74673
SHA1f53a96dcd5e29f5e1ff7b084c57738adc5e76c37
SHA2568165f8f70d1af45863ec1c2f55887cb2302042fac2015c79efc85b4f9e6a252e
SHA512d3b96f2bebacb74850f551bc40dedbbcedfecb48dbfdbc03209ee749740700c36efbdb5697ca43787e8af4d59f044862f2a4ddf1f0837c582d28adfd05360821
-
Filesize
7KB
MD50522fd143cc2ff20b962a9fa81a82002
SHA134e24a0f3d41baeba3efa0e366afd221befcdd26
SHA2567beeed6bea7622db59c9a60a8605dcd7e2aa5e6546700ef83d2f16ba5321a53b
SHA512695d51b3a800a5bdec4804c421c7a6fae67eefe38ab6dfa961e162bea2c41adadaada59fe2964de5780ae7f3b97c4cbaf519e4910e71bbc2635c7b68402a6fc5
-
Filesize
5KB
MD55c450ca6f38cbb23a15c66b37d7e5a36
SHA138e00d20a195f3b51f40cb1e211a47de5d9ade3e
SHA256a0adbc098a69a63d0a80b1b8ec6ffcbb71485ab1ff49831b53231fe1d112594f
SHA512c93d7564b4a5e764a8a308ce2895e5423e415745b47dfa8e97b835b12a1df79972c1d9380e99654f757dbc997c4091159d18145d1bead6c8e5461c4f190492fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57ca8228b0dc971bfa77d034d7ddcbc76
SHA18981fdb162cb661e916d46222c9dbe2a667bd799
SHA256a67015d38b53a5ed92eae5af63c863e5b26b37087ba406586abf00ba52862f40
SHA512303c8366c472cd96c60cb05aac2a347d713f2d36fbc9bd1446d5c98d57e6f755a276db88d8a04eb997276b4f6f8160f392a37d8d71da9e1adbc05af1d085b4bf