Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 10:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0c0c1bd3dee048a1d13d5bee0bdc5a1e.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0c0c1bd3dee048a1d13d5bee0bdc5a1e.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0c0c1bd3dee048a1d13d5bee0bdc5a1e.html
-
Size
48KB
-
MD5
0c0c1bd3dee048a1d13d5bee0bdc5a1e
-
SHA1
5152f4e9280c65ba80035fab641aaa9b9648c756
-
SHA256
9e208e317d6501ced29e14eadfc5c69c7c60e6dfddbae766320cc6ef001525e2
-
SHA512
c9a4c0bbe4a98718430213af2ea1c6e37c942e6b269f7460242328569afc1b6cc429d11e05a10f78087bc2882c91d5e03a6466751dc991755235b8de64c863cb
-
SSDEEP
1536:ptUtUKuIMkUn2WwUAUUU0UY2B+UuUuUDUFU8QU5UU2UQU2UzU2UwUFUOU+UnUDU0:PUtUKuIpU21UAUUU0UY2B+UuUuUDUFUh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3668 msedge.exe 3668 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4172 3668 msedge.exe 83 PID 3668 wrote to memory of 4172 3668 msedge.exe 83 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 1860 3668 msedge.exe 84 PID 3668 wrote to memory of 3588 3668 msedge.exe 85 PID 3668 wrote to memory of 3588 3668 msedge.exe 85 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86 PID 3668 wrote to memory of 4920 3668 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c0c1bd3dee048a1d13d5bee0bdc5a1e.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3ec546f8,0x7ffc3ec54708,0x7ffc3ec547182⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,9778909332660666658,15466536751393452719,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,9778909332660666658,15466536751393452719,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,9778909332660666658,15466536751393452719,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9778909332660666658,15466536751393452719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9778909332660666658,15466536751393452719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9778909332660666658,15466536751393452719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9778909332660666658,15466536751393452719,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,9778909332660666658,15466536751393452719,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
465B
MD56ee4f91a012065b5ace4fe3e4feeb3b6
SHA1c0bb9b3208ad3775b26ec61d84e3ef4208b5417a
SHA256dfad7c71b85ee0275d0f1d4e933ca669fd40e188a5e72385fa68f7457c25e297
SHA5127546eb3a88641c66d07ce100c673b99075555a9e34495ee6696bbd569710e9b057fc5520ae10ad6daf3e54406812ccd1b6e5dc91374f44fced6754a73d0de1fd
-
Filesize
5KB
MD5564df8dfff728fced896a8a4d5783211
SHA13c207ba3354600ade5df7cd300e0f7c561440543
SHA2565b975918979f0255777ade325ba3d752d50b7a7bc266cab5a3b06a8d85ecae8f
SHA5123f1fdba18e7f5217ca1393f97880677807807c91e61c3ea4260435411d5aaf4c41ecf0744da0a67a7af92ad4932c2eb47a5c9b53fa4db35ecf772a63094d4f6a
-
Filesize
6KB
MD5ed7cfbee94204a62b1d188553588c4eb
SHA1ebefadba6c530ea5a00e66ecba76cbe486f4a2d4
SHA256adc917f43b33abbe8ce9e6ce81722d4bc086570ead7c4ec462d9d0419c6d436b
SHA51237a7805a7762d594cdd0fb5f32f01f51c560d19cb35809d43382e515e768bf1fff5b55c1938709743b7710f9a55b97b2fca5729bbcfe72816e0b66fcd81fc5d5
-
Filesize
10KB
MD56a8523d577890ffc668fafaf2aaf4d36
SHA11f1868af6839f624634b2492fbe846724b457901
SHA256dab1320846957522fd8045aa96a24ae154ec6015c39f394bc352c66471c37ee1
SHA512a9f0e23d80dab5c673c64ba6af82efdde8448752d5ae8aecdb83fe707130d81f5a60a7abea909145aa5907e8e1e04968e0203f93aba0cdb5ecd5b63f3773c902