Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 20:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d1d45f0d907add59ed7ad44ab26a7868.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d1d45f0d907add59ed7ad44ab26a7868.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d1d45f0d907add59ed7ad44ab26a7868.html
-
Size
99KB
-
MD5
d1d45f0d907add59ed7ad44ab26a7868
-
SHA1
bd59a2df9272af4c63116d764f4ba14abe8f31f7
-
SHA256
ade73cb89c5f395da622bbe46ab82aa1ad90ee58fc6017c6f69485c16a2341f8
-
SHA512
8781210e99201c23d40039cfeacc3ea4a8f9c6003ab38af829b0b355cd520caf8045f789c799d0cd14edf4c6b03fc19ed36c389e9686ab9bac2f1262bdb4cea8
-
SSDEEP
1536:a6Ob+xV1a79l111f1p1F1p161781q1Y1q1g1R1D101D1+1Z1c1Ls1c1d1Yw6muC2:a6OSxba79uBy1Oe2l9nnuqpu2lE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 1240 msedge.exe 1240 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2276 1240 msedge.exe 82 PID 1240 wrote to memory of 2276 1240 msedge.exe 82 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2672 1240 msedge.exe 83 PID 1240 wrote to memory of 2748 1240 msedge.exe 84 PID 1240 wrote to memory of 2748 1240 msedge.exe 84 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85 PID 1240 wrote to memory of 4008 1240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1d45f0d907add59ed7ad44ab26a7868.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffd1ad246f8,0x7ffd1ad24708,0x7ffd1ad247182⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1787116293379038787,1617301134648211506,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD52861fbe70eda52732cf602facc565070
SHA14fbf8e67ab88bc597ab8ddc2b9e5873549de451d
SHA256b84f6686f4857ece5902d0c200770330bbea2f602882f7b69bd07549dca09e1a
SHA512d340080ec2ee1b1ada966e25e63b9f41bc549333e2cd91fa50d1e1f12057e5b8a226ea681dc4f471888ad0058953cc11f8e969fe5a69fba06f04143674901b74
-
Filesize
1KB
MD5410f30117701655e657501acb65a56c7
SHA1a459726b2167a70fd333084d0c22ca3ad7b62a27
SHA25659e8074404bdc4cfb7a8b889f064db2d68aea2ce02ed80c68db56b03c070e3e3
SHA5126609c5798cef1177fc160f97aa21107c60cce399952f0dff89b89116d2e47d9809f2fe433712ab973d2bd17ae0a43ceb25ddf623c7a3ca7b6369c583d9592ceb
-
Filesize
7KB
MD50fceff6adecd575559300b1acb76755d
SHA12a23e2d9608e89f201347fa9a9a83405d3916bcc
SHA256864c29649781a6eaaf2d06d1313c4e6a8e9c63b073c2662533b1807f322e889c
SHA5128c1ed5301d9fb6f107d7235258a532623054d5eb6944867727b511f84e5f075c8b5158eaebd91e27e267c2c42d6f6f37c9a3757549a1dba36b78c7ef318280fd
-
Filesize
5KB
MD5e5f5c89759c829b9392e9aa35d3e0e22
SHA1496170085f6bf887ced2db15cf13706a6472f1fb
SHA25652bb3106a1b8e22dbd0f59b00f0b910a4efafddeb311b8b9a23e7b74ebec0f61
SHA51294a93c4c420e151eb4107f54ee12ad396576dcd8be1fbd4d560467f8dbc29f9a7818ba9f967566f0c1e4d2e5acacc4bd7c6d0d2df9bacfeb8f7e935bc4ef29e1
-
Filesize
6KB
MD5c1a31f4c116bf7248e9e27cd58d2e1b8
SHA1ddfe32402cf6b7f376e47c89a6ba64f4c8d6c23e
SHA256c36699b758d58628fe8c93b63c7c15bdf94833703fcdacbf423f8be4139e5f06
SHA51224b8aac8fc32e5163206d6b799d83f6c0b2e9265963a5285d02f74a19f4688fc15db32dcfd504400319778b6772ce7d22b13749005ed913736e88d4d8a6af825
-
Filesize
10KB
MD53988c372486e3e581a4f2d8ec0f191cd
SHA1a15468afe9175a3a285ff78d40e912c9b9407d16
SHA256de0515268076cd0401ad04825d30a0688f95a19346b93ea4a099ecf4649abe29
SHA51288ff0283b6642cb0e344fb9ecc6fa1a94ab57a41aa528e08757456a1cd5160e9f380f9d5f5b8a27a151b8b8841247fd21cd7db7d9f1862cf9ce2ae944ee24814