Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 10:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0c27b7140d2d4785931525643d8d3630.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0c27b7140d2d4785931525643d8d3630.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0c27b7140d2d4785931525643d8d3630.html
-
Size
127KB
-
MD5
0c27b7140d2d4785931525643d8d3630
-
SHA1
2925b1eebb5bef4e9e9aa0bb9275635e78b84db7
-
SHA256
adb44337b2674b09b807d8e96534f8ddcf6a4fd7395b3c6b8e8d7a9ae8bb9508
-
SHA512
197d89f07c8c603884844eec988e002535f18bdc712cbaf593ea57c40669b1b6a1a2af2123ce96c41a9f3b1d16829cef5284b3bad03292a551b56e28d66b95b2
-
SSDEEP
1536:CXJEEJXFM4KCDrnDD9BVZfkj/f5w4w+i9:CbJXq4KCDrnfVZf9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 464 msedge.exe 464 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 464 msedge.exe 464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 3868 464 msedge.exe 83 PID 464 wrote to memory of 3868 464 msedge.exe 83 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4256 464 msedge.exe 84 PID 464 wrote to memory of 4456 464 msedge.exe 85 PID 464 wrote to memory of 4456 464 msedge.exe 85 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86 PID 464 wrote to memory of 4476 464 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c27b7140d2d4785931525643d8d3630.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72d046f8,0x7ffe72d04708,0x7ffe72d047182⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,10719331575486551683,13815323492643421416,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,10719331575486551683,13815323492643421416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,10719331575486551683,13815323492643421416,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10719331575486551683,13815323492643421416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,10719331575486551683,13815323492643421416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,10719331575486551683,13815323492643421416,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
1KB
MD5587eb4bc979285932a2915da8d31837a
SHA1f273f0b21ef81f8c8d19b5ee067426c8adc99a2d
SHA256a5dcee57511b52bafadb6616d92a16e1283d80bdef079c5636ebb1d3d238ff31
SHA51254fb5115eda6fe5b11fc9ab5cc7f2dcc73abc6958922dacf329f67a836582a3c9b4001e7ccd31aced58862eb49c3de3b0338d2394fb7e7ec732f636b6d8ef62b
-
Filesize
6KB
MD57bda7b5e3a2194c4b99affec29d7bb4f
SHA18f6e16cf85c5baaa58502220271227093630b395
SHA2564cb77332c5b6b0f33093282608586bcf349e891157ed35bca106b7e84f17d7bb
SHA512f3d0399266bf057d691229655364bdde50817c290e6e27510074e2514740c2043860c5c7b6f5a8c3331c692f7c9cd467ff1227a1460b241c0f46924ddb2a97c9
-
Filesize
5KB
MD523702f8ab54b8958d1f76f76a54ca087
SHA1701cec790e239a796cfdefbfb518c3a88788e60c
SHA256f490fe771ed4331680cf13d980175e7482b8c07bd04bea56d145cb3cab4425d7
SHA51295cdf3c6ccad5113be06aa78f0add1ec5235bc47a452da37486e1143920c93f213f196340934c2ccd15c6e3d504bd6f365ecdb86e052cbfed5af976678b7a2d5
-
Filesize
10KB
MD51f0a51d827216ffa35d21fc2f63c2eb0
SHA1181221b6d4e8892e57b64e0159d1f719bc3a5898
SHA256b76eb962e95566d5e365bdb79f76f5d5168e36935c568093639a33743e834a42
SHA5121c2f8352eea1d12366990ea3ba3aa43ce38bc5014f0e6b2a56c15c5da5b78a867b10ed3a869d99652544e8b6ebb4e1875257483133625a098f525970b03cf460