Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 10:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fef2eddcdac6a453b8e0967488950fa5.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fef2eddcdac6a453b8e0967488950fa5.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_fef2eddcdac6a453b8e0967488950fa5.html
-
Size
60KB
-
MD5
fef2eddcdac6a453b8e0967488950fa5
-
SHA1
c6cab3e13f100a522de973321c3e6913211a2eb5
-
SHA256
5c0ff6d08d1a84a2e0e936d962fa885ae02caf5cbac924d49164a40df4b84ad0
-
SHA512
9a2eada1ff8a374cab153b01572c245e7920920d2cec6c78d1fed0c11e655126619a0bc407d54da17d8c3c75e9fd3a89c0d43688b18788447928b6dc02a7d4ec
-
SSDEEP
768:JP9P+oSmRhv5owPcm98CEjPwmdFPPseKxH0FaI3D214/dtV:JPkJmRV5owPv98NbwmdfFaI3D/dtV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 2892 msedge.exe 2892 msedge.exe 4124 identity_helper.exe 4124 identity_helper.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2928 2892 msedge.exe 85 PID 2892 wrote to memory of 2928 2892 msedge.exe 85 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 1808 2892 msedge.exe 86 PID 2892 wrote to memory of 4508 2892 msedge.exe 87 PID 2892 wrote to memory of 4508 2892 msedge.exe 87 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88 PID 2892 wrote to memory of 696 2892 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fef2eddcdac6a453b8e0967488950fa5.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe06a046f8,0x7ffe06a04708,0x7ffe06a047182⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:82⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:82⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17787524139158607405,2127051717756232490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD595eed2a25c2e0991dbd450d18c47922a
SHA11c94d79550cb7e4d42b96d8f39b27911bc5b7b03
SHA25694a85737caf2fe62e94bb01285ef78a16708bf9cfbc3e94e93e8745e1e78c66b
SHA512f3a9f7a3d5ab92d83f237b90cf92e53f85f27f59fe6997b17475ac55f8166608b11e825e1455dd882dd9bdee5d3239dd6f0efd51dbceecba10e5c8e3c1ec6865
-
Filesize
3KB
MD5894fbcd0ed9c621022e46ce91dba1eab
SHA1544abedf358d925eba6d891719467a695fb2d089
SHA256b543e72b8467bedc7f07b3a822b572be592199f27f295aaa15d139d070f84cef
SHA51267eba9a715e3e56707fabda0260d7286822b8c1fdf44423e02a44fac7c38e50d56bc6186c81ad5889eaa045cf479fc329a7c02625410ffe02c88b4dda7cf8087
-
Filesize
7KB
MD51a6998e251703a50e9d18c6edd92ecbd
SHA133ea3f126ca97f105aad95caa99e8d0b49b995b3
SHA256af362eb6d7ddeb72d791bdcb999388c0fb0f9a6340eaba9e47972de21c079a10
SHA512ebe24f558f993e8921e9ffe7691362b4ffd0131fc6537e5f47a70ba19c631039547985c88b337bf5f703f4ddccf7caff053f5ba414a7d8665fc13c23e080d306
-
Filesize
7KB
MD5be724b3755f862d81bde3b4d57468944
SHA17ca134c2b8f1d3f9c1b560efc8ee5cff619ebea7
SHA256e4c58a6c140cd4d8ccdec4775da48f0672500f8a4b87d9629107d0dc54215650
SHA512bb57ef88828a9e2291228411903dd5d0ef7c98b30c74dd74ad57c966fbf0ee6c988046fb94b671eae944deed6316bba11c19b8985b13082c6c23f38a7b6006ba
-
Filesize
6KB
MD59519b0330f5271d62d286b9374cec144
SHA1db160ef39f3c22bd41cf2ee21cc9dd5836bcd0c1
SHA2565eb24406f6230355ca4aa8cb2af0817187076533472be2ba7c8fe9472c8d157b
SHA51274a2f3f6260ae2f775a4a99c9400f6687f24680f27b7af4afe03877df3a6a97e9a45f693c2d96fb27c81f6ff94acf63865cbbf282355360cd9cc62990ee48a8f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD583af73496908fdabe511d2f378898fbe
SHA1a8143c559f881c3e66e32b4bbfa92a14597a0708
SHA2566c71a42658f4a27b9e98cc2cbeb860c1ab450847e42220fda89e6ba64425bff4
SHA51217a13a010c45babf2b5788d5c9cece42b49dfd91c4f408d821cec680a08a1b666e304c7c3ae90391e2421d075956ed0486aa685cbdad1b3ff9b1e2bc9f2c08fd