Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 07:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_924f2241e67db18583ee8c09e352a70b.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_924f2241e67db18583ee8c09e352a70b.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_924f2241e67db18583ee8c09e352a70b.html
-
Size
85KB
-
MD5
924f2241e67db18583ee8c09e352a70b
-
SHA1
0b221a523bfdd4eb2be595a93540325d04aab8db
-
SHA256
18a3dcddf0f3efc8ce2fb1e40442b69f0569dd81f80e8e316781481b2705d048
-
SHA512
5033a7358878f1bfff8b37cd7eee519f70198505a0b8ac25697df50255b4f8e301344b216c4d3b0763f03f6f6b15523994d582765e1b033acb47acd88badf897
-
SSDEEP
1536:9g+xjv/XRyGXmNJUzIfVZeDliFOzcYwPYMorHf4Qk:9BxDAGXmNJUzmZeDliFUcYsYTrHgQk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3516 msedge.exe 3516 msedge.exe 4968 msedge.exe 4968 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 3560 4968 msedge.exe 82 PID 4968 wrote to memory of 3560 4968 msedge.exe 82 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 4488 4968 msedge.exe 83 PID 4968 wrote to memory of 3516 4968 msedge.exe 84 PID 4968 wrote to memory of 3516 4968 msedge.exe 84 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85 PID 4968 wrote to memory of 3452 4968 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_924f2241e67db18583ee8c09e352a70b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd446646f8,0x7ffd44664708,0x7ffd446647182⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16924749099360836677,8964255277446492366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16924749099360836677,8964255277446492366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16924749099360836677,8964255277446492366,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16924749099360836677,8964255277446492366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16924749099360836677,8964255277446492366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16924749099360836677,8964255277446492366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16924749099360836677,8964255277446492366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16924749099360836677,8964255277446492366,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD50a110ed94c0569a27aa1f462771307af
SHA1c1a8abc61af58faba5f008c3a2d1fb83776e02da
SHA2560e782d836be4df1cfc1b6f14265e7869d075bd4e848ce9f8646ae6cf32c93573
SHA512ff7e33e0b0b372dc5f21a1fc2ee6ad92c522db0f81ba87aff40fe2c6a3ea44aebedb86cfc079e203744922ebda198d1dd7f5750aac97637745e0b5f657414555
-
Filesize
2KB
MD5303ac8d3295585b5bef668be60f047d1
SHA1f4482450dceed9a981bd10836b75ccf6b8ec2f4d
SHA2561b8837cfa9d8c47acd89534a75de3ccd1caef1be869c7b6248a2403d3ce8921c
SHA512dc6dcf9a77c425b03574928701db840775fdcca2542ac83671ef191c07041b62b36d197b142a1448bad73cc379966c6d91f642eba7ffae306d513a9dc7305328
-
Filesize
5KB
MD59f75dc0ff1fff16044eeda6ef2628cc2
SHA178ff34fba477de49ea0ec08861343579ed457dfb
SHA256421190ad12e2c0c391f822c23dd582c087cf7b192232c30b4f2213b361614c44
SHA512fd1dad1911017e1a324510098168b72642165ab310f0f5858ac2d2999fa6816979ec872bea18602736efc4cff341ecc0bd514663650acf27c1a9660017a36de4
-
Filesize
6KB
MD5acab7a2f7b0884564d2a1458d1f9d807
SHA1c48e240548af6bb8ae7dcce7998b3823140a703c
SHA2564d6b9c1cf2f4bc85dc36aa8784ff710c636025f60a36e25b82aebbb6518c7490
SHA512e5bda1edc586908c8949e9f555494d5d8ac1d2b4d9b7c0d12b61fd059825b7956452f8a8aa4b6e7da5b7d3cb21c8e7c3bffe6bdb7fe215aaaec1a3c3745897dc
-
Filesize
10KB
MD54799d6b44513c762d04b5f0249d11ecf
SHA1678ec189b1c35f87d8b26e0dd5c42b5f31b137ae
SHA25686de97c1be3470f13de1cd2c160db2343495bedc68f116931ab71c8bfa6473be
SHA5127b6b80a8bcf3a4b054c7207a78f4fd7c6e9c0f04f8f5b58cfc613dd7dab487a06f857913d2e5281fbebd631a98f90aa3862cb01a60d97cf0c68dcb6dd9909411