Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f8773c0851503d5c7ada4259499a8227.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f8773c0851503d5c7ada4259499a8227.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f8773c0851503d5c7ada4259499a8227.html
-
Size
117KB
-
MD5
f8773c0851503d5c7ada4259499a8227
-
SHA1
e8d919c46e917bb3b95361b7f68ce720ecf752ca
-
SHA256
32cb71a7ea1983217b5eb695861af56d499bfbe7bc110d2a952539f049cb9079
-
SHA512
d3586d6f40030fc5d06d10228147960171c19e6907e8ff8dc6fcf6a7e3d69da138b41fe98149e241714765ba62f16341784174b38fe461c89daaa60228137ce2
-
SSDEEP
1536:1EFwEz4TF3nB3fjnK6ZQCQAXXUoCRADfZqfaq1RT4FHdS:C/+FdLqRA0J19wHc
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 10 sites.google.com 16 sites.google.com 17 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 2244 msedge.exe 2244 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe 2244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 5108 2244 msedge.exe 83 PID 2244 wrote to memory of 5108 2244 msedge.exe 83 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3036 2244 msedge.exe 84 PID 2244 wrote to memory of 3620 2244 msedge.exe 85 PID 2244 wrote to memory of 3620 2244 msedge.exe 85 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86 PID 2244 wrote to memory of 4880 2244 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f8773c0851503d5c7ada4259499a8227.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7c1246f8,0x7ffd7c124708,0x7ffd7c1247182⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7152 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2889187044234522932,10908647664561211063,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5288 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58011dbb34330698cb77abd22b7ccbeac
SHA1bd554e014e9832bf56824f41c8e56b30ee57afca
SHA2564ee4939762a43da70650d2f1c366a64a15b17c63671704b549137e58c73914e3
SHA5123cbb38ea67e048fa5ad120f88dcbc8b3c2e9e750cc078ea87db68abe061d39fa0baf1b49da9e260f9ecb02f7bd8c2799e8b90dd26e3fb82b1bab3af42d616f28
-
Filesize
2KB
MD5ff67e0fe0fcfd064858c10abe5d82413
SHA1a8a0f0970c48757dde30a692ec3a481845554c56
SHA256247795ee9b8f1e04246843935010874088b4f6e7202b21a0b2479bfe8ce0ef50
SHA5126c2a47dec2d1ed9639ed9e32a6c9333a904590e85298607a60ec25b5a7ce06d5105234f0c87071e9a096424703c4aae5d656e4b89acc024b39b37443cdd21953
-
Filesize
5KB
MD5eb488304088bb8726628f428cabcf60e
SHA1b0fde7a344d61a3403657eeecaf8efd70def552b
SHA256f30cf870048b203216392546e9fb8e0c76a05e3e0594f425b84979e260c3bbdd
SHA5129f07960ee09d6301fba123e01fd0a5425c12cb4d824961b5e946916243fb1dc7ea8ffe2675ce1822737a5a70ffbafbb7c38334ec067dfa7f589a48afc9ad29b2
-
Filesize
7KB
MD5e930340d53ae7541a10be7ab3fc27351
SHA1d6c43dac6f815d3026ff6f4869d0655e9f9f1ab5
SHA2568cdb7607bf87bafc69b65c2c39977b9e099cd8c50ccc32e2a182e41b6fb11912
SHA512af4e94ec528d3231aebd3761de7071898a4695c6d88f728606f72651704fdc6b282d3a17a155643d1b97eb89d5c46983795c8f665bd5e0d1dfbb7dcbb47a0c8c
-
Filesize
10KB
MD577e07b49a8141865c39058efef8434ab
SHA177278ee92848a48c77a268b1a62bbfa5ab73c8c4
SHA256d5305e0070f50ab35852a1b21eb360a9659546d6b7e267f11e7f139df25222ec
SHA512c79996ed3734e1b3c2760e915686ff98e809ea77d075affe5398eb9d35d95dc64c00a75a6fefe7058a02d9b3a30a13757ef5e2094bd04b4fdd444a36899f73d2