Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 11:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_79687b0e0de5d1e4accd31ba533f71b0.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_79687b0e0de5d1e4accd31ba533f71b0.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_79687b0e0de5d1e4accd31ba533f71b0.html
-
Size
153KB
-
MD5
79687b0e0de5d1e4accd31ba533f71b0
-
SHA1
eabb5e3233cca2ab1486aecb2ebc239f3835f994
-
SHA256
695a5533b4f6fb836a3addd0f639eb4175f5bb5555ac1a9a09ce537ea50e0b47
-
SHA512
54446e79bf2b6d2ee263ac74356b2aed453babfe592645704f97f121bd8f1e36fc61df6db9fd148b38090cec65baa89978ee6969871ec7bd3c33a93f6026512c
-
SSDEEP
3072:S0ubt0GgSuyfkMY+BES09JXAnyrZalI+YQ:SzLsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 2588 msedge.exe 2588 msedge.exe 4812 identity_helper.exe 4812 identity_helper.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 3976 2588 msedge.exe 82 PID 2588 wrote to memory of 3976 2588 msedge.exe 82 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 1568 2588 msedge.exe 83 PID 2588 wrote to memory of 5116 2588 msedge.exe 84 PID 2588 wrote to memory of 5116 2588 msedge.exe 84 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85 PID 2588 wrote to memory of 3216 2588 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79687b0e0de5d1e4accd31ba533f71b0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8129e46f8,0x7ff8129e4708,0x7ff8129e47182⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,18254766759159689584,13382115493350685576,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
5KB
MD5e61732b9773f7a8667daa3279734de9d
SHA113aa601c031394f248c89a46400a5fec03bdcb1c
SHA2566767220364254d2b7651e03d802545ad41e272eec1fa59ecd700ebd1c878af00
SHA5125ad134800d47c8bcfd00e8aa1bbda00138d809bf2f5aa8ef2b7bd15d89860c676b67c1e6ab465e64be455eeb9f0b7b503a91e509d181748772c990546791acff
-
Filesize
6KB
MD5998568264a8d32391ed23a522efd69d5
SHA132df8d4fbd9e893d4dca691791e02b3026508208
SHA2562dc0eac9ea8f9c271ff05454f04bcab3c5f2dda4d7c9434bf8e919e052d39569
SHA5129e7473573533ba65b6cf83375856519e9033e33838da92b8ec325c522d56416839df48d13d88fdb4314736cf743a14981dd3cb6df5f492bb27c505dfb823af29
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51bed6121ed96fb71dd076ca223c467e2
SHA1eb8f03bc4b7a25593cd565fda2f993b3b29e740f
SHA256c7dbf6ecab68d5b5364a795297282545c315f72b81f212801f8331711d0de997
SHA5125d741b43fbf52ab2d84989b07d4d198d492812b5824d73b1689e7eeefb1d48d04de1b90765b7d8053e88ed1cff554efa1b16dbe5a3700d0ae2175e0af69cdeb4