Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 12:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9fc6a58808f86dd2647b6435d6d7ea92.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9fc6a58808f86dd2647b6435d6d7ea92.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_9fc6a58808f86dd2647b6435d6d7ea92.html
-
Size
68KB
-
MD5
9fc6a58808f86dd2647b6435d6d7ea92
-
SHA1
e1528479be5c54e6e2dd523ec407f3526abfab67
-
SHA256
f2411c2702aeccb0052394ed1600de085640bbe88161f5a9c2b3f48a60340432
-
SHA512
460c361918bb6c583fef8cc592ca13c9c9e7df26727f90153add4960efde8e037dbc067fac622ccd32f4424797cd9aa12e1102969740c5355ed4a2809cd22aca
-
SSDEEP
768:FPVpXEnpQtUpDoQwYkm6q6f/O5iMlNohO/d20YUcFEYilDhpdbl77foddja1niE6:9fxCZb5UdcN3onzkvDSzg1AJSetxw2Bn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 992 msedge.exe 992 msedge.exe 3096 msedge.exe 3096 msedge.exe 4964 identity_helper.exe 4964 identity_helper.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 68 3096 msedge.exe 83 PID 3096 wrote to memory of 68 3096 msedge.exe 83 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 4088 3096 msedge.exe 84 PID 3096 wrote to memory of 992 3096 msedge.exe 85 PID 3096 wrote to memory of 992 3096 msedge.exe 85 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86 PID 3096 wrote to memory of 3128 3096 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9fc6a58808f86dd2647b6435d6d7ea92.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff553246f8,0x7fff55324708,0x7fff553247182⤵PID:68
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7746871924183730196,16275023266569233055,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5c6541b4e92fc1acc2c159c60e1cd4b1f
SHA181a22ebf553a4caeb7b1296e03de8795e5455b06
SHA256ff9e3e31369ede2450d949028e6b46954d4e1bac812583e5c90c407408a0d6ba
SHA512f1bc9cfc7b618f3c897de79deea8bc032bb284937463b58c59b9c84fb7381b0a34f83cc93e5152f09d1a7b33486f0d4fad37398611677f1567a8054eff72942c
-
Filesize
885B
MD529b53e2e4c8af6fd6260ffdd9e885a90
SHA1e5570c3699b30cf132c5b681db4a1defdcf0c255
SHA2568f8a6ef4360dd7a9582c755e448586ed78b8f20ee9f0ac5ffb0195ba27a4716e
SHA512f62aff211f471b8aa4e4f64489a9c8edf72a309bcf03e5a5d3ba78f03daeeff060900ee1640e42cc1d70f0c6578e4d5363b8c3586e861b1470678fcb6d4b1af9
-
Filesize
5KB
MD5d312c0cff2e620d135db4b33ac28e530
SHA18a9fa1c7e60140030d76eeb5a928b979a6bc52e4
SHA256efbffeed9c0e072317f56acd5885aed526f258e8d8290343184c0b7df7a2501c
SHA512b3a6509747c200bc919d79298f813453cf558eda28656f9f9d0ec73ee73475d4990f66b00bf872407c789f3c7c88bfba29451ee402bca4ab24ee430b12a119e4
-
Filesize
6KB
MD56fedcf0c9626eb57003dcdd128e45ac2
SHA1fca957420f6c8e6d8225aed55c9fe5ef7baf0202
SHA2569a6e4c06ffcbca747a2d79ec1f6943344f8387382c1477544e011ebb06ca51bf
SHA512002ea6068b67e48a4d54a864cd01bb647e6c515d1ecfed51f4aaae8f3b8b0e1aed242b043812f3a13c89e06f1070664d33604ffd3f86a07cfd04d19b35678640
-
Filesize
6KB
MD5415af407e9e403cd267769a907d362bd
SHA1d8ddb7a50fdcc997f4a8ffb319baaa5a3f6cfb60
SHA25647fbb189f45c9ed7029e205da5dac02b8542215643b131c0b39616d18a519927
SHA51217af6b3ebca42233c98439d2e6a85c82f3237e846f4e254e4e23decf9b45569d9e0bb0c80c80ceee56c22e5640a8eafa5d96d49b9ee38dacfb280f8fa0786df5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59f9d4b4c74b1fdffa72681ed8b3ae1c7
SHA1c1abce8403cca9bb3718fd27ab841c0abaa60568
SHA2565ef64e9aa7030a0257f5d2b5fd8c14acf9ba4d849c81b2f51cf63888bf7afe6d
SHA512a64d2ddca0304049c0dfe3efc0d24eff32aaed668d898208a8b405efaa63b4e37579427df40eaf850a124c6c3772a827e0fa98dbbd9ddc3341cf3c5ed0d11de9