Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 04:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8aca27a98990c67bc5a7e5c7879e8836.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8aca27a98990c67bc5a7e5c7879e8836.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_8aca27a98990c67bc5a7e5c7879e8836.html
-
Size
183KB
-
MD5
8aca27a98990c67bc5a7e5c7879e8836
-
SHA1
2b83a9f1800f2b49537481347a52dd3b0fa93f04
-
SHA256
0b4b91217d2607368980cf4b86354a3ea587405fb2786a6801f1c17b2e1dc7fd
-
SHA512
db1768251ab4dcb8dec8931ee328580babd2b0097dc2b283cf746b191fdbd5eef417f60740403a44a9845f8305d267ac105ac4fb13a693b4541bbd03e7690d04
-
SSDEEP
3072:KXxDNvG8rm/GXmNJUNBVTXQUe+EJCO36LIBpScbbb/tY2Fkngw1aeRb:aVXmNJlc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 5088 msedge.exe 5088 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 1448 5088 msedge.exe 83 PID 5088 wrote to memory of 1448 5088 msedge.exe 83 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 2912 5088 msedge.exe 84 PID 5088 wrote to memory of 1664 5088 msedge.exe 85 PID 5088 wrote to memory of 1664 5088 msedge.exe 85 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86 PID 5088 wrote to memory of 2904 5088 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8aca27a98990c67bc5a7e5c7879e8836.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcf3146f8,0x7ffdcf314708,0x7ffdcf3147182⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17839870622155338718,14677230540858856845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
20KB
MD52ebfdbd309ee762211b4a2ac39708c4d
SHA1b002922c672dbe1dd4caa02af24d0b1e7da616af
SHA25654ae97d445b166859fe3ba6241b97abbac0aa0d158c72352b774d60ba3e81797
SHA512d1687b7a6da07a72963c96a1e85661046d3d3c96f88445302afa09721fbe211a5fb8881ff14b346b0ebe8a20f5ced21979e9f58e256427e57b85d565bef17720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5914aa89ef10f616c1d3153141667dd19
SHA1c0189e26ca14a0af7f73ae5777484c108dc50931
SHA256c088e5a528e700f52734acad092ba8845d2cb0d2a3b540be7de9aefc457ab27d
SHA512c72382e98f12656c255f088894d2d016e3845d3f8d3a76b4612b81f1b28350453fa3734b0705819ac8839fc45f5a56f5212458c95fda37534c4d1239e4437293
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD535b7dca15e792766ad5423031573a57c
SHA15d020d958740e8a2c04c488f3077b5b1ba54a970
SHA25691244b6006763ea6e3038facabe22302a9032c1bedac0a0817d6c8b6e877547e
SHA512f8df2cd85255468d79e49ef40160d4e71a742c84e83413839f2fdd279c380605c7ad41cb2f4c3d5b410462270686537b9e0a6e23d636a35c0558fd0d89d8031f
-
Filesize
2KB
MD5b8a3c82f4d93eda95cedd58dd06ef8dd
SHA1e1b7b8d6b6cc9809dcee777feb7d79040ce254e4
SHA25601b5fc693cfa55a71097e9726b3289dceae43ad31d8356806faf517b2ec1e80c
SHA5128c24e215e85928562cb5e212c4773f084d66e3c2423798765e7a8f23a63bdc448e5a72d17470b7723a46356eb6d363479270654cd6102992ac32fdc720a94c4d
-
Filesize
5KB
MD54391846e2cb89f7103111e2e11585eb9
SHA125b4c577d3e2edf02ec813763d7d2b9b550422fe
SHA256ac28fd35a2fb4f748e121f373d160c27a2c192432407a57aaadf0ae8ad884ad1
SHA5120869154fde330456c7c82bd606d5e74c68d6ec7a0b54b98ca179ccf90cd4d6dc4400a03f4d34a6f25d63527d2997fef88420174274dab9b31469b0d9cfde80f8
-
Filesize
7KB
MD5967182aaf6ab265764f2a7cb9af67808
SHA1fae659fe6fa29a72f8443e08012be26292fb6e00
SHA256cd8d8254c1a8cf4fcca4d557090945e4bff85401401f65f32b9053fb74f60268
SHA51226d903afd758cf02c69c804f90afce0bf0e579979b97cda03abf0322a7136e70190b4642ffdc474513e5ea5a93704c572668385cdfd4ba8f3424ab277d118084
-
Filesize
10KB
MD52d3392b4b498232900bab7caaf4d7217
SHA1fbde880e25891ded0a1cdf6391a0d5e8e8b5034a
SHA2562a3367468f55b6afa038e265152a5bada731f283381a2af68572f5af9447deec
SHA512d65339d4015ec6651c014e7018d7fb8206a5f383eb5adf038771babcd6050173a377433230eca327c7d01e9783ec9a5c03f07e104e3e41d589e1dee68a5068f7