Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 10:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1fa008c681cab3a96186ef69318441b5.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1fa008c681cab3a96186ef69318441b5.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1fa008c681cab3a96186ef69318441b5.html
-
Size
253KB
-
MD5
1fa008c681cab3a96186ef69318441b5
-
SHA1
6bf1a74aa45c78086dfc2d5c237c8daa2f609a59
-
SHA256
e96aa1f1610454c014d29dcce1519241526e303e7ab3f33ffcdd49a39f2ec025
-
SHA512
c146b77160d490ec7816f0715634c766d0c351d538326ea3ffd2d9abee8f65619ad8368e206a5ebf48f53902c14bbe8ea157ee44561e059de36e3f7de7c6602c
-
SSDEEP
3072:P5+ApjF4ONjVLyeKUFqNkyGsX1uLIhCqd9:P5+ApjdRxye3FqXGQTP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4676 msedge.exe 4676 msedge.exe 2000 msedge.exe 2000 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 4600 2000 msedge.exe 82 PID 2000 wrote to memory of 4600 2000 msedge.exe 82 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 412 2000 msedge.exe 83 PID 2000 wrote to memory of 4676 2000 msedge.exe 84 PID 2000 wrote to memory of 4676 2000 msedge.exe 84 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85 PID 2000 wrote to memory of 4612 2000 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fa008c681cab3a96186ef69318441b5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff240946f8,0x7fff24094708,0x7fff240947182⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14029629094881184659,381311099913484442,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
41KB
MD51da8deabd421929fa1a865599f43aad8
SHA188af7573c39022643333f85b523a329cb6448675
SHA25607b01330c36ae322ea1f1e2ea70e60b629b292b3f7ee7aae5a9968dcf341e685
SHA5120be3f8d02397c3cc32164b116c807115c42a310fd70c72c94b3b523732422ea2b222d8762e81d91ef0c36a8328df4f7ae8e4570c4bc46ab94cbed5131389ea3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD50108591592b5fa711be2c711f388716b
SHA13c5724211e1a840ea83e31bb62fb7f0d68ee533d
SHA25693139fc4f56ceee3da8151f392b5a1a707d35eb86abb92d65afdb88d0ac40b83
SHA512d11accd50e387c4a96196aee009a10028654d195eadfba6c233c22fa551573c443a279a2c84644a3bd80dbdf1fd1c27169125e7cc8239dcaec41f08c6f583d37
-
Filesize
3KB
MD5d1e222f64cfabfebbfc76bbfb06c70c9
SHA13a712f23c49db694322ef2abe53020c3a09cb49e
SHA256f0e52633af71ecbca258a4e96f9b85d6bbcd0035827b386d5bd3c4724116eb7d
SHA512d7edcd6791e6e9aab2ce559f3be3a3140008701304c60a5da69afe57a5e94cf8a5738795f7cb2b1168c089791aec9adefdbd5a0877fa93784d1aacb21fd910e9
-
Filesize
3KB
MD5976809c352fd6f94c2202d1b8b702ba4
SHA17899604e3eb4691a66c048cea372e904042923c3
SHA256a2cb7a77b9279ff460becb457693343fc6ab132fef9ac3ffb21319aaba06ee48
SHA512fd0417ac71b100200b22af48a43189000ad89e20cd6ecb5e5fd111a954a10b7948812c7651ce215087b77da02e254e935faad936f366fbccc34016401d7aeaef
-
Filesize
5KB
MD53e7442e5453be9b62b75600502bc63b8
SHA106fc238a53b58ec6214c9c4a49d3287924ae9ae9
SHA256fd130fbd0333ce31f8d9df2d8683b4495b8a86e5a5ea68ec072df5ba97f73fbc
SHA512d2c333098d20ee918df6799d1cda115212fedd01bfa4e31d0024f3f89f4449eae65615b176a2ee93b5074b9de26bb759c292dbfd5e5f3a03054233372dfe46ee
-
Filesize
7KB
MD5ce21e91f36c93575a2286b575671049a
SHA14dee9f01051e74da46d555708a70d66858945b44
SHA256de6a89cd9587c60de02bd5b78f5d37981e896dae557be16f8c9e1e7c5d0165be
SHA51200583aaf10cb8c27e5cd01b9adf3dc94541dbd11d2c43c5d6afe41ad1ff7c58ba54e67863120ff4e2aa0806d0cdf4651cb417d8015cf2d542c7317c438bad974
-
Filesize
10KB
MD511acc95ad83084cce6a622285fdd94fb
SHA1b225c3674eebeb73defd2ddf7293be57b25e13f8
SHA256a02e9750375ced501466853fd83bc8fb03e1b6b6e9e1cccfaf7b1d957f5787a7
SHA51275915d8998a3a112b2db1dd09df2a011b44f0f7f46cfdbcaddf583b4cdaeba083956d16a35e29896bb400aa888b3ea75f02a4069f9fcdd4750d8ec0ed8c7ab23