Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 07:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_557e625b3625d3191eaa916ea022e160.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_557e625b3625d3191eaa916ea022e160.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_557e625b3625d3191eaa916ea022e160.html
-
Size
206KB
-
MD5
557e625b3625d3191eaa916ea022e160
-
SHA1
ce050a4604f18dc889c7bcfce88f6a8c6fdab4c9
-
SHA256
83dcecc60bd02ea33481afda9f5e9ab8e5961847e5352d7a0b2f6987e3fc5496
-
SHA512
db2fc2fd6d55f28c8bfcff96865633bd40f4750b3afd8d14d46049b93bf7993e42a681b0873cb188775543bd789064297ea9cc91eeb7e1c4cfb11a78f651c304
-
SSDEEP
3072:+Q4SPZD3UcjvG8rM2hFcXmNRSFlYt+CLKtC411t8KNfKdlQKyMi9ebCFY0ZRxi2Y:5JwXmNRKBdt8KNfKdlQKZZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3212 msedge.exe 3212 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 1520 3212 msedge.exe 85 PID 3212 wrote to memory of 1520 3212 msedge.exe 85 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 1220 3212 msedge.exe 86 PID 3212 wrote to memory of 3152 3212 msedge.exe 87 PID 3212 wrote to memory of 3152 3212 msedge.exe 87 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88 PID 3212 wrote to memory of 2012 3212 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_557e625b3625d3191eaa916ea022e160.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcff346f8,0x7ffdcff34708,0x7ffdcff347182⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,5826941579486210104,4367432822530112155,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
41KB
MD51da8deabd421929fa1a865599f43aad8
SHA188af7573c39022643333f85b523a329cb6448675
SHA25607b01330c36ae322ea1f1e2ea70e60b629b292b3f7ee7aae5a9968dcf341e685
SHA5120be3f8d02397c3cc32164b116c807115c42a310fd70c72c94b3b523732422ea2b222d8762e81d91ef0c36a8328df4f7ae8e4570c4bc46ab94cbed5131389ea3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize600B
MD5a07f04543f004534ba9d59a4359d8b87
SHA15b392a92405acb2dfdbcf7d73520a6f790c1ebda
SHA256e7b8d599f4fd71747b10c23aa3c95a2c6fff0ba5c103ace3c87ce2478d1d34b0
SHA512daab75ab59cbe8a6c3e94fb04511cbcc9587d96359c88ffb89596822a92841c10ecdd338a6ecfc34e84782520c9ae67d4007b72ecd4eeae2c230f7a17b0d1b3e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD5246264e3e8dbab7008bf547e88beacc3
SHA1484dfbec0ba045b85f61d4d814973d38b656032b
SHA256a3c80be24d4f1c5731040ba5483550079f44092eaf45bcf0f170c73917206db2
SHA5121d114b696665ea777fcb880d139e3b7484132b9666428f3f12c9e8778f24ee87bd156b2d0a37316b43eaf03f4265556954fb371a59d36cceeecd18ae687b9cee
-
Filesize
3KB
MD534c8d16b4b18dd72d272d318b2fdbb15
SHA1a6bba4c451d0f4ea6b40f5ed4c338b9a31878a43
SHA2569796b85e3c238b3e4f8a98683f8250c0811b8ab7b648261b2a821793317d0ee5
SHA512bfa5b1d7186e952df6deb9dd4d48cd00f095d980380cc0be13627e96bde2364916b901838a8768495eb87236d978b0e48f9e34671f9225f48c3ac35eefd4d879
-
Filesize
3KB
MD52720d79086d7f2076d2ae0a1090b60a7
SHA133a94c9290d9038fe2feec68c9ee557009380a42
SHA256aca4909939c348f6b4af32356ef7a51ad045851cbb9d4f86bd718b6c8c8a11c5
SHA512493bf910f604f991ad95ddbeae92cf47b20de06145fb25a6c95759e88f293b8c1a143b253ff6b9af8d04a7026f265ce8e3c054ab2965206b9b5d94c60233923e
-
Filesize
5KB
MD50ed03c568b03beac5d156427425f5101
SHA1e1878a944bb3ef4abe9218dc2323e3c70edf0197
SHA256bb615d3149e52f1300f6a76707c1d5df1385d3b4565b96ecd8c9b9e095b500bd
SHA51212df8dbe253f1474872bb61c250858f2f0d4371dbbd0a1cbfb484836e1acbd84222e3c72472c2e784cf489b3ac173824458d13bdb2485d9d4dc5c579d7f6efc0
-
Filesize
8KB
MD5dafc5405998f33a03d38da1b07f91926
SHA1d5474ee2caf96076b14aaf5440b2a7c358d4bd0f
SHA2562aaecc16e4e5ded97e5d06f21aedd5189509bd48f4152c886a76681a70981cd2
SHA512cdb294abde410c49f3a03c1c12241554bf825ef4a2809dbf063810e68374038a19f933db83966f9118ddb89a52c6179c0b45de022329a662292c8e4b09c80e40
-
Filesize
10KB
MD5ba76e420148615de21d5606fe19a1381
SHA147039b97d6eb79f41716b4f8512a3c0afe33c324
SHA256131fbfb640541bcb8dda7a84add4de86e422cc40ea365119fbccb13746f5358b
SHA512d7b7a92754a3b8561a857033b64ef126272f5ccb6becd1352499e15f95474163f2d2d80e06e43d17510db364058931bf0a8c3477f297e424b69ca2dd75faddb4