Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 11:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a16c84a788a4fe32c42e2a8713e24724.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_a16c84a788a4fe32c42e2a8713e24724.html
-
Size
27KB
-
MD5
a16c84a788a4fe32c42e2a8713e24724
-
SHA1
3d76c82b3b1c30592bc5ebff1c6bcaeb2cdeb0c4
-
SHA256
bca8d084860e67cc0286e3152f56f2124e8bd09a51dfbdf9f7c804e921244c1c
-
SHA512
091458efd30b99258e09843d0589fd98531d5bb4ba789ddd4bf7b34b421ccbe268a538eac64276f136347192aab2e3322233df039dcd11ba97f6e20e961c3ac4
-
SSDEEP
768:tdDn+T8OxfzkolbsIb7aiXPR3BAE+YUXiik:yTzxZsIbX53BbBUXo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 4376 msedge.exe 4376 msedge.exe 712 identity_helper.exe 712 identity_helper.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe 3360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3136 4376 msedge.exe 82 PID 4376 wrote to memory of 3136 4376 msedge.exe 82 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 4268 4376 msedge.exe 83 PID 4376 wrote to memory of 1344 4376 msedge.exe 84 PID 4376 wrote to memory of 1344 4376 msedge.exe 84 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85 PID 4376 wrote to memory of 1924 4376 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a16c84a788a4fe32c42e2a8713e24724.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb61b846f8,0x7ffb61b84708,0x7ffb61b847182⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,16168961717421223683,333793623457896182,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
335B
MD50e17797829d4c8c8f3d9ae87d29ea7aa
SHA1135c7a0f2b2b65003764785385896d660a991f13
SHA2562982614b047c2aee3207a67ff1cd62278400643c9b5623c393ab0d8f7ad36728
SHA512ab959af7005a86c0dbe1f131d9f5d3d45e614915980b55b11ed09420e7a93fd0e93dd4e6caf43b6f2c91d5c7a2a47a9442537e3d69801de4a077b95d91851be5
-
Filesize
6KB
MD57ccdc2a271823e36b410de7d72051e65
SHA16b88fd61f427a35267eda43f4a635a6e87baf138
SHA2561563abf91af4787fb5a0ff0d6597284be7dea67d486b0f24f289bf2ef8780f1b
SHA512739bfed706914eb577cf49252bf892b4b1bfa88dd6523b713a5388cdce9720cc409f86f90167ff7eab5a9d8928997bc093506bc3aa9caac27e06f11c493713e7
-
Filesize
5KB
MD5bd78f2c09b9b7be974cbdf93851a1981
SHA1792ad08ab07a27e30efb78fd2549b60cdfe51e97
SHA256c8d01f9458197163cbe6e55e343a33def863cc3620e3bd2ff4d94075524077d7
SHA512346f4584075ca99ce14685b7cc46efdc1f905c9d94ae5263d6bee9b44c53c7911ee50e55f8e6b29daeec300c737a6f51069bb8f365f52db9e7415e9cb6166ac3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD596947fc5176c1e1b15b2ec0767d6826b
SHA112f504b7bf9ebd7f7e3f7f847c333851003f5b3a
SHA25636ac8df4cf6b02a49afb7f762280df38790b15e98b574d9ef0faaf67a5f4ef2d
SHA512621158af3cfd6409a94e0062e71e94fbaa3517bd942f176474b10bee15cce9cd05e05bc25c2a48fef4a11e586060236d33b501ff13fd54067c746f97e69a2101
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84