Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 00:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f1f2f0ecc40876fa07b77af868900d4b.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f1f2f0ecc40876fa07b77af868900d4b.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f1f2f0ecc40876fa07b77af868900d4b.html
-
Size
103KB
-
MD5
f1f2f0ecc40876fa07b77af868900d4b
-
SHA1
2a4635ec48ff7cfc9b5a19c1ab0c7a5617ceb38f
-
SHA256
9d410d8aa31bf5eacb1835da80e7c11310bdfd9eeea887b81a1f51f9330d2f3a
-
SHA512
a7130a7f53f6851fda71ad1f750a3732dbc685d18644d118b1fe7623dafb1a6884c31fabc776aa7ae8702560998bd1e9490f54108e0ef23cde8f3c22b0cb09a8
-
SSDEEP
1536:Y0tqpmaOhQhCCzt8k9N4AxsnZ8+I75M2J/pyiFdftqzf/FO/WHcbKQEJvlqo+Ud9:YFs+zt8aN4hq+bYpyiFzSHcbGp+Ud9
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 sites.google.com 34 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3724 msedge.exe 3724 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3936 3724 msedge.exe 83 PID 3724 wrote to memory of 3936 3724 msedge.exe 83 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 680 3724 msedge.exe 84 PID 3724 wrote to memory of 3572 3724 msedge.exe 85 PID 3724 wrote to memory of 3572 3724 msedge.exe 85 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86 PID 3724 wrote to memory of 4128 3724 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f1f2f0ecc40876fa07b77af868900d4b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9ef746f8,0x7ffd9ef74708,0x7ffd9ef747182⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3281382193098754938,10337778693553818528,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3281382193098754938,10337778693553818528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3281382193098754938,10337778693553818528,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3281382193098754938,10337778693553818528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3281382193098754938,10337778693553818528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3281382193098754938,10337778693553818528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3281382193098754938,10337778693553818528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3281382193098754938,10337778693553818528,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD54df7f11cd9ba6db2ac5d34b6383c72bf
SHA1d6bdee32971109113cca1f62e1139980bb3d3b91
SHA25600facd57220a66fa51cfd7242dc8f5d9d000d4f40deff7ba7d752c2ad5ed352e
SHA512426f2ca272dd424754952d6d73a29c5e23831f285a72faa4251a40908d66bd6382276e8d2c240d892b3b2a52c005d540044576acc18a756a96c58083700875d6
-
Filesize
3KB
MD59af8430fcadd01e3f45d58745427ab4f
SHA1954b08361557e37e0103883400d638ccb58bb471
SHA256c3b1d3d97de955b369a717712dd68e172abcbdefd14a5cbafdf68b49b8e1f099
SHA512ebc609708798e347dd97a3be1a6c15f617b1f928efa9e53d8b397cd63e0d7d57f6906860e306b45a2eb6fa2ce8d43f91dd0fa580e533f662f0146fe1c71c7123
-
Filesize
7KB
MD5a7b91d7fc3b49b91c7424cfdfa64442b
SHA1d0c28d4efbea27f3d81187189bf44ecb155ecfd1
SHA2560a04e706a7eaa2e07312fb5666b9923af3ccb32107879898f372bf2139f129ad
SHA5126311f1b8bdd43a7e24081059295c2ad1ab10d471a99bd9151e654c288baa87fad51e08284be604d70f343a483ec432c834f23f63cd7eac08955f8a184d1461f5
-
Filesize
5KB
MD59b47302473996c9849dd83660d0b59e2
SHA1d0f03e5c5b5ac55c28e9f9ebc5408f3916709275
SHA2563dc36945f1ac7eabb01cf5af7e979c4eda804506a66b871b1f89a4bb9aa6b03e
SHA512eb5f84234e6c3941dc625ffe5b6386b0aa9726dc8f35cb71514e877f40a3014b9b90226f1c764cead24d849701e83c03444e947f6a4f34e3b2573c540fa1d298
-
Filesize
10KB
MD59e08a0064750af11647a0100e6656b15
SHA170ae738d9b59fb6d10e4c29dd0dc2f45fd107a6a
SHA2560238a8ebfda6f00e2b801fd7fd02fd00f7cde15a80e356663ca8a75557b6f1cb
SHA51289e313aab909797df50f14bdc95cb2ed93426b2da7e2a22c5bffb3fa78d0c238f32cbcb4a449e5b50403ee987a698e81f0664d649c862a561eff65be65cc334e