Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 16:50
Behavioral task
behavioral1
Sample
JaffaCakes118_6e5df0d828080d3829b6eb2084ce84f6.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6e5df0d828080d3829b6eb2084ce84f6.html
-
Size
19KB
-
MD5
6e5df0d828080d3829b6eb2084ce84f6
-
SHA1
21394106b41794b0561a3f7cebff2caa74a7812a
-
SHA256
98040c737e3c39ad0fea3f7269bab5eafae08abc7de3b55ddbc707601591b912
-
SHA512
5abddb4094e1611a06aca31e8dd0ef0e8a299094f84acf52b1f53bdb9bb62dd4b9f8b7835f5803f2779e1b5a4d96521045a4c39753fbf253c71917365f0f60d8
-
SSDEEP
384:zBqtZRsVuEc+6bkuOENbvCul0LgIssbQbDwiTkBFV1aG/a1B7rl99Ye/ZGr1h:ItZRsV2+6bkPENbaJZYDN4n+Gy1Jl3Y/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 3132 msedge.exe 3132 msedge.exe 4856 identity_helper.exe 4856 identity_helper.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 3720 3132 msedge.exe 83 PID 3132 wrote to memory of 3720 3132 msedge.exe 83 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 2320 3132 msedge.exe 84 PID 3132 wrote to memory of 4064 3132 msedge.exe 85 PID 3132 wrote to memory of 4064 3132 msedge.exe 85 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86 PID 3132 wrote to memory of 964 3132 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e5df0d828080d3829b6eb2084ce84f6.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa14dd46f8,0x7ffa14dd4708,0x7ffa14dd47182⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,2906526011685343329,5814275381290298937,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5492 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
602B
MD570213202a0c5b6f2370779814890f948
SHA15ef5098deac2eaa1e4066ef38e8ba746d3b09f22
SHA256d1d10862a595601fdfb20ad8b6998cf34669a58aa280cfaaef24a99cc88befbb
SHA512f405010452b5c20fb9086de20bf07ef37f895d9a1f748c592018a7ac1c9f9e708fccbc1989fb5fc43c6aaa436e4c350d9d43aa81557ddaaf39c23fdb8a597fc5
-
Filesize
523B
MD5748271482c592cfe0de6b0352e96f628
SHA182c673da80f4acc830a3bfc604ee5cc216d9f8a6
SHA25628166a062236f86a01da12591ab0d087a80b8c5542ae136cb04149a45618be1f
SHA5123d226d73b099bf8df1267fb686d148aab38dd6dff3261c02c20da2c9e4b3f0ee437ec6a2ac75fab21fe407c15878294504994843ad6dc0f615e5b3aade96a9cb
-
Filesize
5KB
MD518ffd9d51f7aa8e8ffa8939e81b8c4b7
SHA1232f35f5d2ea4bfd743fc0958416b6af7252ad92
SHA256f99aa748bd2c61138686d52d0e8b8485bf22ce80fa8cf485ef076c88d2b10899
SHA51224bd42f1cf39dbfe738700ecb94cde9e66ea0bc95846f6001daa0123e7f98d769f2b8f2b80cc3c6293fe2090ccbf61949305035c5c7d2126375f587252795617
-
Filesize
6KB
MD5028b9a1466937d8b3de2656ea24c81dc
SHA139243eb1434bb4cbde8a5376ff6ec4508a5f1f50
SHA256fc147c3599effb5ba31dfb3f8427d4946e8c2aedf6c1fe3dd8290d7d6a899ee3
SHA512e34b8c798d698318f7e49458a1c262d636cb84762006f1e172f3a61a0657f01df94f3805d56751cf501b40499b667fee99a402f930478ad1eae66bff639515a2
-
Filesize
6KB
MD5e0f7eeb84f4dfbc43076059de4ede634
SHA1cae4d06eb8656a6a1309956ec76ee45964ba4221
SHA256679004100e42146d609574e8fa6b5e8dd3b76607168e18921d3a218430a3abee
SHA51202d3ef2acecd1a20ee27de331aef3f8c20880d695b15632fa50722ac9183ebe6038e1e1d94e5d97ee51b629b72fd1e2e957bc15aa9f3cf8529d66df5ea742514
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD580f4a71ac264bde646e72f2a1b9ab0dc
SHA1b521ca7cc44f0ec0a3f975c59840fbae5e40a47f
SHA256bc651ddcb31a0f3bdf2f00d4222daf6573474730d5d20315e982aaa033a4d30b
SHA512edbedd8b08239af5cda3ec55160cb5e4fb0518dbf4a4a3a05ece9b76eb354945eaa00d103ce08639dfa0b47c2711fb29264140c563df088f5ebe3e8ea8376f0e