Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 04:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8b528de4c6e47710863b7c1a0db1e0e8.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8b528de4c6e47710863b7c1a0db1e0e8.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8b528de4c6e47710863b7c1a0db1e0e8.html
-
Size
58KB
-
MD5
8b528de4c6e47710863b7c1a0db1e0e8
-
SHA1
01bf7b0b07c6ec07c8279a0bab964454b74c00f7
-
SHA256
2d5393f305285e63e1f28722248b4a8882217cd623d12b3453c4d0197ceac320
-
SHA512
76485382bd33703495df37d5221153fd2d1666971ebc79d8092e3eeb6dec64c578cfafd321f37041c2b1ba59126d8fa462d40a746b1002848522f1d70eee60dc
-
SSDEEP
1536:/BnLXKL4KpB3fUS9n6V6e6Lu656uS63OTg4TrNTbYTB+eeNvT4EkzOjkWbuv/tVK:5nu4KpB3f5Muv/9KvBd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1048 msedge.exe 1048 msedge.exe 1356 identity_helper.exe 1356 identity_helper.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe 1048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1664 1048 msedge.exe 83 PID 1048 wrote to memory of 1664 1048 msedge.exe 83 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 2804 1048 msedge.exe 84 PID 1048 wrote to memory of 1484 1048 msedge.exe 85 PID 1048 wrote to memory of 1484 1048 msedge.exe 85 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86 PID 1048 wrote to memory of 3048 1048 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8b528de4c6e47710863b7c1a0db1e0e8.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3fda46f8,0x7ffe3fda4708,0x7ffe3fda47182⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6912 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15209051426641661960,12614852399243492526,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD51477b0af0af60ce463c12cd823a0fccc
SHA15468fd1c54569f7e440103ab52ca1700723722f6
SHA2560ddfcc620261e434cce84cb1cd7a28fc85e923c2707a5cf0ecd195ba02487205
SHA5122e83db51e012374cd403dd4532b9467d87e1eea1c18f3a3c82b99635f171261a2872f533a0e9026407c778eeb292eca5490b627e46c8960f9c4a39c8db492401
-
Filesize
1KB
MD586fe38b4fb2de655478533c60d6f2c50
SHA1545a44caf5cbbcb9ae8e494e8a93dd8453c6781d
SHA2567b51cf638c1514282b7e73704b9bd5b770fcd17e92f5a8c94c9c527e3d0d298f
SHA512b4dda16f4257c69e8b9a1a8113ff05356083dba86a992f9ca10706604cc2f5b45130db8bbe240fc7c01038774a2cc7fa8e72bebe304221a80f307f2022528996
-
Filesize
7KB
MD5f4f5a49a3383804b3504865259c01235
SHA1ca498295d15755b8aff81f4f150c2eea2c825cb7
SHA2569387594b94cef38e45ee870d2d8e58172b0ec6da057a6201ce8c38f6f9b4ff58
SHA512c12339eb63a26db0148e799a29f7e896eb357133376bc594ff8730a4314614ec0c15a941c5002d42451234eefdfd879bb6c8efcd2cba9c4d33b0092f08d506ec
-
Filesize
5KB
MD52535fb7ff9f370e263a54b2deb3600b7
SHA16ce526fbebd91fcb19cbef3d5b5c11c6d0537b36
SHA256619d02a250a37c66b6cf0c9e92a416427d9488ada985cbefa6ca67cad03e0cda
SHA512dd382c40cbd94d70d83a13fe2e50d6f52c8c10367373e24b745589b240736792bb23f1a122caeac14b82b4013e4d75fc0eb0eb6f6b3b330ceb45c0ee3d36bdaa
-
Filesize
6KB
MD5fc5a5d2e15f8399a6f3d1a78a352fa2a
SHA1139b4847cda2d70e882b107f57264917d32d9c02
SHA256445ebc7501492b28602e170f9ef0c81eb7e2a7514df381f7802c5629e61df00d
SHA5129e99f4a82145cf1e80a207ab056020089271087d286fa0abfdf820ce8bb75949f90fea0ca0e88b734eab5db35fc39497617cc544a4255d2fb723a2ee1b20696c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e8301315707b097c8cdf187653b0f924
SHA1e9fdb9fa42299e9e8882faaa8ac498ff42522ae2
SHA2563788184e9987eb8e1e43827deb78064d91360d70c0e03ae1d7d8feb2cf7d8ddf
SHA512999e5fafa35df0cea6927a1dc03fb1e845e64b48c009fcfb5fd368242a490d56be272d84de8f862cbb24ad799c94773f0ebfeb87db466b432780af6ce2131da8