Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 02:24
Behavioral task
behavioral1
Sample
JaffaCakes118_481a81efb43e1ff3493986001cc8481b.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_481a81efb43e1ff3493986001cc8481b.html
-
Size
19KB
-
MD5
481a81efb43e1ff3493986001cc8481b
-
SHA1
edbe1c866d6c89f214ceb52fcc8b595639bed2df
-
SHA256
7a469ad6619e038ca67480952f4db07f3eb55858b388aadd60fbe992ba37ac1a
-
SHA512
fa9fc5a490550e04c44b71c65ccf8b989da6edd5d1806af2f3b5f210665fe8161b17b8fda2c6747bd4b60cdecd4294ef247d1f565ad1d035ce9edf158398d54c
-
SSDEEP
384:zBqtZRsVuEc+6bkuOENbnuCul0LgIssbQbDwiTkBFV1aG/a1B7rl99Ye/ZGr1h:ItZRsV2+6bkPENbnHJZYDN4n+Gy1Jl3s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 1248 msedge.exe 1248 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 3872 1248 msedge.exe 82 PID 1248 wrote to memory of 3872 1248 msedge.exe 82 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4216 1248 msedge.exe 83 PID 1248 wrote to memory of 4340 1248 msedge.exe 84 PID 1248 wrote to memory of 4340 1248 msedge.exe 84 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85 PID 1248 wrote to memory of 2680 1248 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481a81efb43e1ff3493986001cc8481b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff807a246f8,0x7ff807a24708,0x7ff807a247182⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,2322979407202850191,13682855233992496680,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\91140c58-5f0c-47df-952e-664f9c05f820.tmp
Filesize5KB
MD53087a48c853d4988d412b51ec3f6a1db
SHA1e59417169f6e70a790b6630d3e3e302c0ab856ed
SHA256c3e74957916db4555b08aa9657634f9614825e5b50ce00bb6cd7981017ce717a
SHA51252b486259e9b472f8c17a69d30434e0fdaedc8599d5eab8d9ec2773108c7be4cf8eec2698f8ecfdcde37dce9f343e8cd2d25daea7fcf3e5a783f30dff0fc1ca0
-
Filesize
523B
MD5e89632d63fce14b464555e86e5035afa
SHA13d474c01914b6e56ee4e78ba01c9148aea3fa5e1
SHA2560ef35a11505170227c3850c44e55a9c7d7cb7b55a982463a3abb64373fa29a45
SHA512a26aad87fda6e336c77d1b67eb81776b39eb6f25369c68e3b4b42a3e397f372d7042145bfbc97898756e87e0d34fffe22e9eaf6feb07390b8dbffa43d71a23ce
-
Filesize
602B
MD581388072edea4ab5f7ddc4d62c2a577b
SHA102f1f0304dfeca889a0c1fd6efa503c45d60a7c3
SHA25666f2753cdc98fef5e52c46e7e9468ef3ceb83a05f12b6b735086a3cc2d7a81a3
SHA512d5f778abc6afe5b8ab8ff4690960cad64047b31eb1f9e0c7458ceaece0e91f3a64e5cf1a6b2e79ae4fcf2efb646dcb4855b24ccb0364a085d4a5ce28d656a65d
-
Filesize
6KB
MD55fe93ed5db58e5e28e8e0d806b529594
SHA165187f01509241c876abca87af53728708d7e23d
SHA256328571dad084d475dea6835958cff8463bfdc99a3ec32e4e032ddabcee4ab769
SHA5125586ad9f74e1650708a4da13f8ae5cdf299f88545f604fb774a40b668fa8310f8d3bebe228cfc72db12d6cb78594ce587e62243f12d97679ab1919c4afa20c53
-
Filesize
6KB
MD51c8b21503b0a06f931e0ab55a9ec28f5
SHA1d399d457118b8cd7e6c78b88a69b5d9547a90e0d
SHA256afbb87957e50d413e321bc032a30728bf29d8cc9886db1f6a9467e2fd3469456
SHA5121e8a1a16315a7cf0c5f86a77c10b1a14af4316525df9373d88e62c0efe3632d6b6113cd70903bc7cca0cc267381c076764740a38fa50247965ddc98ff68866f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD521a9a417430bc1cd8b6ddfa91d5f390c
SHA1066b906307f8bba2b776a46a6cb10fc6ea1902cd
SHA256444f2e23d5901f1f0b638c1ac8f2922d75a1278d47d5585dffb773f649fe12ec
SHA5125a8d33efece54ea094bc1e80b2bdc9640d5cad56da0b5fbad21eddf3638f0468fd249909a82a2c7624fd61caeb4d4db28759831ec43bdd147fd73d71ae1b7029