Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 13:19
Behavioral task
behavioral1
Sample
JaffaCakes118_79e5b9c05a49b6e2d017d63e411496b0.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_79e5b9c05a49b6e2d017d63e411496b0.html
-
Size
42KB
-
MD5
79e5b9c05a49b6e2d017d63e411496b0
-
SHA1
b49f9c15429f06dff81366bd8e02f97256434ca3
-
SHA256
a67f97ffd2b1e12bab4cec035716a8ec1c7f7177f71a87e893ea92fcb8370d7d
-
SHA512
0c9846ec501698105e4faef8f18edf4b27d841d4fb7812af40bb0b669df166879c426d7a1727f7d24a21b0f5250fa1ca459c698b5a372eb2387bde780c7d0c44
-
SSDEEP
768:7YBoO8lclcmKDvEsgOkcNiTV+48kphYpqwsqeqIqm:7Y+lmNyXGUYYEw9nZm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 3616 msedge.exe 3616 msedge.exe 3076 identity_helper.exe 3076 identity_helper.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 4400 3616 msedge.exe 82 PID 3616 wrote to memory of 4400 3616 msedge.exe 82 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4920 3616 msedge.exe 83 PID 3616 wrote to memory of 4836 3616 msedge.exe 84 PID 3616 wrote to memory of 4836 3616 msedge.exe 84 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85 PID 3616 wrote to memory of 2272 3616 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_79e5b9c05a49b6e2d017d63e411496b0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab23f46f8,0x7ffab23f4708,0x7ffab23f47182⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4731390309157393543,13906259769778689021,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5500 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6a7c4dcf-0218-4de0-b13b-7f6e8c23f62c.tmp
Filesize5KB
MD5cb1150279122d3e037f25aae807ab010
SHA11f55c99fbc794479091d4e4d201d4661562a86e5
SHA2567bf88201a0537b627b07a00190ea600de39dd707c70550f2fae40ee34f98979e
SHA5128105d21e4e8c67263c86b556ba48a36e81efeec01a02a94926b1ec892eb0e2ca4ad361ba65be07e48ecacf0961dd85c7690e6c24480d863658157fcc5dc9f9ba
-
Filesize
259B
MD59e63c73c9e709306251ebc0745cca13b
SHA126cb35657311bc5a63dc8b341bb9b306f0aead26
SHA2567e5e08aa5617e0b0e549acb86b7900298fa05a35f093b5e49ef54a9557d0805c
SHA512b33f4c864fdbf8714163a6f088870ea2233b1a789604b070239361602504b727068840d4b9fb78506321de34c1cf0b73572a3adb0eb53d5fd5595479d4eab6f0
-
Filesize
6KB
MD53f552b7783eab0b4903fbdd847ad8db0
SHA1a1158a5f70195fe77f4f53d16ef7426953c865c7
SHA256ce71bbaee3ef46308ee3a2a0c12ad017451b1679eef083486b193917dc0f22d9
SHA51237e28ed6a271c27a6f30be8fcb41197e9aac578694ca099f81f74ea3cad6141b23424ec11992e619ad875a23d13a3224297418a7427216607866c063b5849990
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fcb285d34d5a448693b6ed311ec5bfe9
SHA1a5a52afcd982cf041a0aae2f270718c456083551
SHA256e46978000dd99d61cec5a5949cdfc6e8d4edb0e7fa8fddd9560e6ac1f379f0d6
SHA5120d61a78dbed68b3eb4f75932087086553c4c48d8052f5fc094b055d879df8dc282bfe3625845079f03f271272420e2e38fed5ed03a442adfec584234028780b9