Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 19:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_75aeedc687898501f0c12697572f6f68.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_75aeedc687898501f0c12697572f6f68.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_75aeedc687898501f0c12697572f6f68.html
-
Size
179KB
-
MD5
75aeedc687898501f0c12697572f6f68
-
SHA1
1380e64ed4d336a3beecd348554a36e383df1ee2
-
SHA256
1e1b9ff6c1a4576e2f218106cc25f9921444f11398962bb3dd3ed051c3f38b3b
-
SHA512
62adc789e3fc1fa6f49ff18851a91f6ed147468dba9747e5d84e7ee6a424bb280b7d72ba4ea63431759a8df4d167fd81ab7ab21e3a3d1ef2bec1592aca492544
-
SSDEEP
3072:ExDNvG8rm/GXmNJUNBVTrQUe+EWp6LIB33cbbb/tY2FSngw1mNRm:yVXmNJc5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4804 msedge.exe 4804 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 860 4804 msedge.exe 83 PID 4804 wrote to memory of 860 4804 msedge.exe 83 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 1712 4804 msedge.exe 84 PID 4804 wrote to memory of 4496 4804 msedge.exe 85 PID 4804 wrote to memory of 4496 4804 msedge.exe 85 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86 PID 4804 wrote to memory of 1444 4804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_75aeedc687898501f0c12697572f6f68.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe109046f8,0x7ffe10904708,0x7ffe109047182⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15172364915901442062,8681229593897113036,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
20KB
MD52ebfdbd309ee762211b4a2ac39708c4d
SHA1b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA25654ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5293158af80d1e1764eb040818ce96d22
SHA1c274b608377952e8ceed44a29da0694fb1f91a14
SHA25663429c4624f4ef47e2881f206e64435ff5b2c54bbb226a9da8163376166d5323
SHA5126d5c0b2f559b30021e0aaebdee320b42e73889c7851cfb3133094d71614c69fbe54e2fd23636407c903f7eeab7c66ffdec95143a4220eb603eea47aeec8a735a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD540001f781dd5ce3368b8109820ba426d
SHA1e637c84c69831111830f5a9efb9e843e028dc61e
SHA256de5723ddcf9abb927d3ac8f627392259e417d7e421d11952421738c6e4de27f8
SHA51250b4d6b7b125c55809d5c9149a480a73d061d83bc1478c0b766098db2184c1f76cd4edcf4af65067acb58dff79cd84a75c32844de392c9fd170c7e670d07b881
-
Filesize
2KB
MD5ff8c53b1c8c889203a1bcdf0012c7fdb
SHA1b59b4d87d81fdf34f47a87282601b0c7b8069fe2
SHA256e281037c91ff1b26c51ed750f5f6076f6fddab40616ae4fbe74b58bc657f0141
SHA5125f490b5a157d15bcb501c64afc87032d1197f3d150b45498c003307466ff58161b85def4888774e71d3b2aa923069437d0eb0b859e5038788855020672d3e805
-
Filesize
5KB
MD5fff35c1f851e5f10ad1db46737d67749
SHA17f817dc26621e206bd0006b90824fa025e23105f
SHA2566afb496e20b964543524023dc124787c999ba641975125cbb98decd1e46372cf
SHA5125826649053ca0db1e23e6e1c2f15b470bed52800ce699b5b7d1d5f6413d95ae9061167d9de3062998482f7d91b7cd82b1823922817063b33c957b4eeb2f4a3ac
-
Filesize
7KB
MD5fb3e10889f41f1658541f29ed827f8ce
SHA10f8899af176d91e7578408b1e25c0d0bb71c82dc
SHA256b3c772e04cd85bf47f5eba48a26ff1ab6187957f82947f916925c26d2f697a53
SHA51230e610ac1a5ef78fe82db3e43d9258a74ca6adb09e8d02851b7347954b6a37863e2f58041def2b65bc34f486003964e2c6b02ef0b090f226bf38282b710ab41b
-
Filesize
10KB
MD5c4a1d7627cd1daca8f0bfbcffd9693f6
SHA1d2627a1ac2e03b6178313a15cb5a3b16425b1e4a
SHA256add5a2e0e151ae87bc65721d28e9deb837ce01e7f37679c1a9ecaeba5836079f
SHA512b29fb1bc63925b4353bf5c7f55fcd4bef9d44274f583d06eb3e5be9fa19db658a3356e9c3e5f7b870ecd621f22e496daa1169e4bb271f8e61daa4704c1368f91