Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 09:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5bea50dc6b054ba7b1d6fd2347ea2381.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5bea50dc6b054ba7b1d6fd2347ea2381.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5bea50dc6b054ba7b1d6fd2347ea2381.html
-
Size
185KB
-
MD5
5bea50dc6b054ba7b1d6fd2347ea2381
-
SHA1
14cc114581fec2fe70eac0304052cab3baa1f69b
-
SHA256
acfe5760392c97e37350970d03a3722b60b557c2940b392bfaf5e4ae79aeed13
-
SHA512
7c4739c466dbfb702e83ec1e962f6e31db86f6eb3c4d86ca8b978ddff2568374e4744addb8bfd5f75a873c0baf49b8f9038e2a84e86b894caaf1ee53b321a9d9
-
SSDEEP
3072:dxDNvG8rm/GXmNJUNBVT7QUe+ElDCRa6LIBY5cbbb/tY2Fangw1/TRl:pVXmNJXDCKU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 4748 msedge.exe 4748 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 5060 4748 msedge.exe 83 PID 4748 wrote to memory of 5060 4748 msedge.exe 83 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 4376 4748 msedge.exe 84 PID 4748 wrote to memory of 3240 4748 msedge.exe 85 PID 4748 wrote to memory of 3240 4748 msedge.exe 85 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86 PID 4748 wrote to memory of 3640 4748 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5bea50dc6b054ba7b1d6fd2347ea2381.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff99aa46f8,0x7fff99aa4708,0x7fff99aa47182⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11625648811076890853,17403830585076013265,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
20KB
MD52ebfdbd309ee762211b4a2ac39708c4d
SHA1b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA25654ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD515792841f8337886b9d1e41dc012770b
SHA1cb85b7c188c12960dc6d41ec61c2ec50b3f3e1d3
SHA2562b1a961f2c9dad0730386256a726d460d56b9748fb2813b9029346c469c37575
SHA512ca9ca3c2131c4cfd427fdd8f97223d6791a8c0cbba31def94834ee02aadd39088b3879796eb0932632c52d4d6735b2a3e5c304bd0a441fc07006d6ce340abee6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD59745a517660724039873a98138ff064f
SHA1bdef6d13f55f53003ccb93acbb38764e17c0ade0
SHA256c14cf9606eb35c108fec0c66203861ce16323512e18fac78c183c60840c70c2a
SHA512150010cccea82a9655aae2dc29b583c3c4d4adf882d3619bd1fce83476cfd4e6fa3bd357a56b10e6e94f2d5d020ac3e27748568d78f7052f7515bb239afd0715
-
Filesize
2KB
MD5aa54e5408a5354685a38a9f9ab9957fa
SHA19e41cf26f87a8105e38c8b9a531126d926923adc
SHA256043a2d2444c4a98481fc3247c628147683dfe56cd4bb8b9be3f9aaf26fd6dd60
SHA51219f43a7ea725301aa937b7408c95437c5edecf4aa94192a80f1d8c43d612b7c971749bcd31eae55e220b84e1bdbe6349383b0eb2c0fe87780f50e2cd489c1fe3
-
Filesize
7KB
MD53c3202f659ae3ce0fadb43443b2b0324
SHA107b050f78eb3c87ea2c7e158f84b0396037de652
SHA256aa9cf404a52d8a5ff0824ed95dd905511e138f4ea379e5f7b81f91bbcf901552
SHA51245f5dcae1b04caaef755ec1bdf5be312e8ac7fa6361ebba2b18e4434db75c4139f56745dfa163f4c833c2e708324a7eb96bdff121cbbd859a64563f546e92363
-
Filesize
5KB
MD54d82d33d53ab5fe5202109fb010472ea
SHA1be1e801266ec94fdd6ef27bf86dbfb60bf6702d0
SHA256edcd10b594bcb6433e1c0d028c34786fc5e8c62c6ffcc08ebbcf5a418683a276
SHA512c1ebf1d1760fed2db7233f6a4031388c5723219e2d7e6e29a18ff9bbc83b5c6c3e60ca246bc7b5ab80efcc1b4274d387c60681d66a81238731a01e1fe4ca0c8a
-
Filesize
10KB
MD5a7c5cd5743adb8a82b94f951fe4f1ec8
SHA11eb4adf44359a872c244fb201b67b48fea947809
SHA256c8176dbfe7757cca9335b1a1d94556470dc0f709d9012f0a952180f8d66299a6
SHA51255f0582a8d43ba3c3ef6a0a1a65da5b8a1ca64d83706b1d008e23d449db18d57da218b8c876928b2cf6166a7942d663c75f8f3accc4790d1ebc25dfed54c3540