Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 08:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dfeabad608782de3373ae8435ab9aa12.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dfeabad608782de3373ae8435ab9aa12.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dfeabad608782de3373ae8435ab9aa12.html
-
Size
45KB
-
MD5
dfeabad608782de3373ae8435ab9aa12
-
SHA1
0dbe4177a5f601017d5b87c08ccc255448c0d67b
-
SHA256
89dff700ed2817ad5cbc920112940088f5388c871b2de05de5e194733952f09b
-
SHA512
60e118b5bd740b033e964a7d61a27357c4b01bbb93ca8403acf6226c8bfa9c33c3873894c569029ede34a74846a41682d2fd34fe9bfd7b161b8781784bec15d3
-
SSDEEP
768:+pUDklKTpTfiNaIAmJJ168jJyKIMzLqb0S71CuGQcVljEawn2vftiO06:+0JMzWgS7YuGQcY4ftiOr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 808 msedge.exe 808 msedge.exe 2760 identity_helper.exe 2760 identity_helper.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 808 wrote to memory of 224 808 msedge.exe 83 PID 808 wrote to memory of 224 808 msedge.exe 83 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 4488 808 msedge.exe 84 PID 808 wrote to memory of 3216 808 msedge.exe 85 PID 808 wrote to memory of 3216 808 msedge.exe 85 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86 PID 808 wrote to memory of 8 808 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dfeabad608782de3373ae8435ab9aa12.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92e0746f8,0x7ff92e074708,0x7ff92e0747182⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,2025652559810712046,11181852394464811991,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
694B
MD53cbc67ec53e1f9247c13aff0b87aac10
SHA18b569e9746376772dd7204f8b6c3e96026b38ee2
SHA25630fa3023d07f7741fba677e3e002b3fd93d52d354916af3c6d699b00e2509ec9
SHA5122f77b318a091517d01730a200e0474700d4b576aee81ed07e77bd4a9898449dbe8361d5b776082900c9605eb302881435388ac30fd126c09197465ea46c55a0b
-
Filesize
6KB
MD55cbc7636c448c5b472e22a2544d78aac
SHA100be421bd07c4f09b470aef4cc3ae7e7084dc6d9
SHA256f1b0985ea3bf81e52c55ff6cf3757ba6be6c820e9cbc6ffe86a1796a51c135d2
SHA512134185205620caf0540408b08b3e8ee6243ba5cc1442be6498eadfdfa6a09e2230297448235cd9b3a8bc7fd8a2c2d893c3e0bca8f92152597bb11b6683c45e81
-
Filesize
5KB
MD5fe0c9b755ce61ad78b33a0aba26c4ec3
SHA1a79a1eedebea9024d00829de5e603f1ae88e9b72
SHA2569675c5e0d73224ec6f1bfca14eaeda586c4758dc805343e329d7fc37eddc1a31
SHA5120daa86628c625033863c03f976f100c5074508bd9799b741542a0f9d53e00a10b7b183815e481ebc8d80efa66ad89fe1c4f3c085a5117cdd560e58633af4d91e
-
Filesize
6KB
MD534079d663d3b8aa7ccb03470f813a2db
SHA12738ef1a1a3d603b3f794bd58d03ec7a8767522d
SHA256fa245c7ff674124f5de5cc1b2094c5d8435b2ba805ea44c27085264f403568ee
SHA512e4eefbae40c63814cc37f8ae09baefb610c7abcfe28391f830c61233a1575108ca74d6bb9ff53fbe8091e06db1dc710964a9d0e0e31c0124d0a64b7ab5d25ff9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5444d2d83bec274e4086d7a167d0945a5
SHA19f35214a8b6a1d08e602616b7b466be59b2391cb
SHA256deadc7aef7ecc31560aed534dc094e048159d62d6c0fc38154ee03202fd060fb
SHA5123b3ccee74fca4d1c2dcd701a84182eb8ea7a3d448a3c55e2397373aa1258d2aacc285d299bacfacead4fe19c92ff4f47df4dfdf1bcd9d5c2d1c106c6383ff831