Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 02:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_84829dc549f8705cdd4498da590b6f21.html
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_84829dc549f8705cdd4498da590b6f21.html
-
Size
28KB
-
MD5
84829dc549f8705cdd4498da590b6f21
-
SHA1
d6113395a721e1c7017075c483d28e42fe1b604b
-
SHA256
b5bc05a9ba5a06680314cdf1af14827b938c09f82505ae8179756f8db643dd47
-
SHA512
d2354cc9b31ea6bcfa2b49e2cea1e9ac4a4e27c6de943f8b7cbe4d0211ae7861d3e8a5f0bbca95340bb71d2f43590cbbf36c50af50d71a4f6afe6756a9e52ca6
-
SSDEEP
768:PtZRsV2+63kPENbeJZYDN4n+Gy1JlwswWuR:1ZRsV2+63k8FeJyN4nB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4588 msedge.exe 4588 msedge.exe 4892 identity_helper.exe 4892 identity_helper.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2380 4588 msedge.exe 83 PID 4588 wrote to memory of 2380 4588 msedge.exe 83 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4676 4588 msedge.exe 84 PID 4588 wrote to memory of 4552 4588 msedge.exe 85 PID 4588 wrote to memory of 4552 4588 msedge.exe 85 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86 PID 4588 wrote to memory of 1268 4588 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84829dc549f8705cdd4498da590b6f21.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec32646f8,0x7ffec3264708,0x7ffec32647182⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10643782488083689587,17657111337378979501,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
896B
MD5cfe05f670c25e2dcde560d77960893d6
SHA151f2335bd4ff14d0d1ae27f2282ee9d047af9013
SHA2565c4e21ae870cc6bcf9fa2a6793b5bbed3aabf51f7c34bd0f932d46289b9c3af0
SHA51262e75e2ccf8f357dfa88029a6dd41d327a81e395eef4f0a53e4ace27c5f32fe415ba4bb1beeb2e26d535e5557b1133cff0e8e63d0e17fd8d272fd78624066925
-
Filesize
602B
MD543ae0b98561810208a777a4a8febce8a
SHA1ea1bd31a21314b882aaaddd7428d1c256ae4ef41
SHA25680ef8b9d6b68be825b000a82b7555ead73e8f907ec888b7648b8b303ccd84c4a
SHA512c383c03bcd3784ba2259f0cb2f0511dca6b2b84b0f1cd944440e973a839d9584b3ea61ede25f09d5157e90465b385efa91a699b50705878fbca3735abbad8109
-
Filesize
6KB
MD56b0845f0af2db7c5b7cc4b58f2392a9b
SHA1851000bd53900cea1782ffdba123964a61a8a764
SHA256c4d8838daefbe054091948f4db6a8dab74384f3fcbff368662bf4cb4275a9afb
SHA512b6e65c5fab600cfd7e72395f2aca869135fbe964ba59621ed1c14b755dc03b716ce3c3bb38f7cef10cfbaa18ee533ca131f19e2e4a99a7daff64a73c475da986
-
Filesize
5KB
MD56bc62f40b5a109fe125958da0b8ffa1c
SHA14b000f2fe3814a6baab3c5552cb1ff44e7f91013
SHA256e74b795bce66daff5a9457c49ca69cdd9ebb9962d423e3b17d7c295636b8aea4
SHA51224c0af43ccb872eb322c2d25d3588f8621d00974b32b89b9e5da117938583f534bed7c2d937e06c7929482aa36424d259fbb131a545de1c7632058aae88e2301
-
Filesize
6KB
MD5ad9e72f2ca2344c1499f966115672168
SHA16fffb9ef66a1d73e413848fafac7d22649c1417a
SHA2569cc65f318f22578262c7412ed2c6db0fd47d1a9c56082ad24cfee2854939b356
SHA512dbd92fcb2854267ee1097dddca4b50cc4533d68d694ca3f68d7b641365aec784d80bb5bc713726297ac224909318bffb8fd2f05418c6f152aeabee8f0c3faec5
-
Filesize
203B
MD523bf9039e360737695672a02a2b8e0ee
SHA11d6dd2b0da1ee2f4ccec2ea5eb7b7e8b30e1f46a
SHA2565848e54e45be2be370367cd5194215896bc2948eedb1da82fd8f39bece2bdbf2
SHA51295d4ac9b0f0deb47dd0ad003c1ec539d29cfa4d0a9beb7e362cbb0a5342dc8732da7fda7ff66523faff6442df9d691435db63cd0bfe28940e91c053d2b9d7b89
-
Filesize
203B
MD50eaf07f55e2c570886c5b621d0e3546f
SHA1492fe5b8812dbe00e6aa70a159610f8548a9d325
SHA25607a1db8c4c98cd8be19b2ee3ada759bd6bbf09904bc540174065afbded23beac
SHA5128ee3d22cc4500cc856a83944f3b7300696b167cdd7332576db186dd8152920f84da97abb0dd2287d4bb9beb72e2ca0b70f7aed59eb4ffd429b58dedc934fd454
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d89addcb753843457e3400ee94624986
SHA15782321eadd962bc86db1858577ca01c49d11f7a
SHA256452838999bed56cb13e528620eb815a0d75d5cbdbd7288f3cc1b92d82f889440
SHA512b658db514c6aa1cd41fbebf12442e0bc779b4f18c1a410473799284505fba0146b88bd070ba3db75013147059495a7c8e1beb77e62ab4b58dd5525ddd44ef917