Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 06:37
Behavioral task
behavioral1
Sample
JaffaCakes118_08131f0184b06d087111a1ccde8a326f.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_08131f0184b06d087111a1ccde8a326f.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_08131f0184b06d087111a1ccde8a326f.html
-
Size
57KB
-
MD5
08131f0184b06d087111a1ccde8a326f
-
SHA1
e5093836daa7d05da659fd034c17389723a2d5dd
-
SHA256
aba30abb347d55214bd1e64ed6ac5fdd7e7a79ea20a9085d345c8ff68131fefc
-
SHA512
c58b31ff29427305918a32abe9a597e3de636480d08c4cd143ae24a141e7d3967b10a696cc7e6634e47e40e6ad90fa8d093795d3137af743f19c1c53b61835f8
-
SSDEEP
1536:dB+aKsNod7hOw0JJ5/Ju1dliZUQ4S1LuoC41:2aKsNod7hORDoliZUQ4S1LuoC41
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 3448 msedge.exe 3448 msedge.exe 2668 identity_helper.exe 2668 identity_helper.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2788 3448 msedge.exe 83 PID 3448 wrote to memory of 2788 3448 msedge.exe 83 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 920 3448 msedge.exe 84 PID 3448 wrote to memory of 1984 3448 msedge.exe 85 PID 3448 wrote to memory of 1984 3448 msedge.exe 85 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86 PID 3448 wrote to memory of 4900 3448 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_08131f0184b06d087111a1ccde8a326f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe241846f8,0x7ffe24184708,0x7ffe241847182⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,5482650986709127626,13098647328102790961,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6268 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5f72c02a35e5a53e16cb41e15fc126642
SHA1bce15c6960b381f61fb151e3ab4158705a851ed0
SHA2564250404a2e4c7035d4700cb00322457374213db12ca025f06ef5a4aede587d02
SHA512b2978cb42becc8941b2fff6356abbecdbd6573fd2046e62edd57327b2918fdd80fd3064cf00bf668130a457694d0db329609e7d8acbb2cef769d5073367f97ad
-
Filesize
2KB
MD5108d27c60acfebb68ab2018f18ef9864
SHA1361350a733a73e4a03c2ca571b94bd4b76c0f5b4
SHA256059633d24a1ea06ee10def2b5d91e654de4157dc3a4e29272fb203abada19c7a
SHA5123a2aead56edfa86db27daecb71b81b2b80cc52ec21405a597e828f4eb6449feb69d05af1655b35510a30b10415a376a27b44d7698556f63aeabdb1501b118179
-
Filesize
5KB
MD583ce5f0e2f309dbef7f16edab6f1685c
SHA1dcfd1d0811da702a2f0345a32752e97b238d0a63
SHA256e0086f22dcd5a1cb2b3a6c573fd939a62f8167a7b4a7871379be56dd236e926a
SHA512e0a186a8a848f02ba91983e24632f4cc3a5a75311f258c377bbf1412dd12b13d8ba77a332bfd3c40e0530bd6a334219558875793a667f7a85dc9ee94f641929c
-
Filesize
6KB
MD57793618305ccbffc10b0c148ea0f9343
SHA12a23895b0b780a55e3eb0a3fbe446df1e685a325
SHA256f1b6cf9cd8dec9a068fad2beac8bbcf5a809476a052bf3e87f44a0f75920d631
SHA512abf7527a883ebe578bc96871bf4e1da29303f511b9d01763956f8a0d8c41f9cd969e7aee52f55099ff2831eb7561777de4811267789142f0d3b6bb51f0792b46
-
Filesize
7KB
MD53b5b81742f769601f775d1000df2b865
SHA1ba5957e7beaaeeb543db5c95cacf9500438281ff
SHA2565b5fab53ebf108976b13f6858ab8e271d240c4348e464fe1de6a9f9ce51968b6
SHA512e86aff06a85395331497b50c3b278536f6e20c19864584baf3d29646b33821d6602224a21f84e2c7a292849a8e3b45c05b73a74a121d97e07b9ef77487855369
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53cc10a75887b6a79103a349f121bacab
SHA1b2c3d334484d0687201b90da54c6a81e0e9dcb08
SHA256448e465bbd23d1d285928a990be0c8bd3c7dfa7a2ec37c1a134786d5819676a5
SHA5128478a616bb791e7bc818be82f5e0e511491a08098cd7d641a1c0015f931a8185c1fe4d0e35bd6954b566d00e67d5da9baa82a42b50318639c18805f37736341d