Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 00:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7f601e845bb5e2633c6ebcdbe0bee6ae.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7f601e845bb5e2633c6ebcdbe0bee6ae.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7f601e845bb5e2633c6ebcdbe0bee6ae.html
-
Size
346KB
-
MD5
7f601e845bb5e2633c6ebcdbe0bee6ae
-
SHA1
75c5220643d6cb415218a0943d2c14f3f3ae2df6
-
SHA256
a6fe0dfe23e4ed31ff237e890d4cb870dd5d83a35c89fd088d881b62199ad6e3
-
SHA512
95b72c3807ffb1955ddf637d2b4fc2ef4d8f2fbac41bdae5e7486c2d82bee542a154336b5ea502d977fca62df3374af0fc779fb75f7e418e3f072f13276acc83
-
SSDEEP
6144:S/MsMYod+X3oI+YyXqsMYod+X3oI+YRsMYod+X3oI+YQ:065d+X3cXI5d+X3H5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 2452 msedge.exe 2452 msedge.exe 4876 identity_helper.exe 4876 identity_helper.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe 2452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2028 2452 msedge.exe 82 PID 2452 wrote to memory of 2028 2452 msedge.exe 82 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 4832 2452 msedge.exe 83 PID 2452 wrote to memory of 1180 2452 msedge.exe 84 PID 2452 wrote to memory of 1180 2452 msedge.exe 84 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85 PID 2452 wrote to memory of 4816 2452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7f601e845bb5e2633c6ebcdbe0bee6ae.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f3e046f8,0x7ff8f3e04708,0x7ff8f3e047182⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,7968580310354692673,2193343731957995486,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD5a73ccc8d49a3b645136e7ea60a9bea13
SHA17a4a88e952db4f5073dbb8b5e51c25fb0b60eefc
SHA256afbf6909f73a7030e5f913c9020de17c7348f4efc20b96cc3d7a0a7f4ab7e5d1
SHA512b3acdeef7aa35182b2c2b4a55bb13cb36077996bf1ae60d26f27dd9e6cd861d7e0bb731e4b90229108ff9577981e2cb88dadca97c4f8ee16bcc38845a957f3f0
-
Filesize
5KB
MD542b42be55fbbc04a2f04d44b9fca95eb
SHA107145ad4259c4a85d00af18d4e1895a1d05c0667
SHA256e74767f2672db8ef126f7458f318c62546b3c20ac86c1e2c2cadd8b6b4a5044b
SHA51298d2965e2a57c5198f1dc8685fc794b7f2cc2e14392e0dcf0dec52777cece977dae50077d8e1e912c3568e891e2b9aee5d46c5251d8f70e37457e7ca3740dd27
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57f5160d70af42d97a38c04430b8a47c9
SHA17abaa47d26831d5deca0144237ca11905ff3ee4b
SHA256d029e9ec909fc9a0f037bc48e70657a145bbf91354f15e8846d581a972de0374
SHA512dbf7986650eb58ffccdaa9a783b8d569f17e6e7906ae9fbe76f657f69a9a6fff72f06f98af478096024af1231e3857b33f4c91f83c862784f615f51a3fbedf18