Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 12:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e274b79543108d58e768641c7e4ffa9.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e274b79543108d58e768641c7e4ffa9.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0e274b79543108d58e768641c7e4ffa9.html
-
Size
117KB
-
MD5
0e274b79543108d58e768641c7e4ffa9
-
SHA1
46fcd3b1f2651803b0d411770944f0eca7203408
-
SHA256
25feb377ef6164ccea7431b1e8117a28a3bea71001dd8f0508767af45b57706f
-
SHA512
2b3ef1249097a71c87f141d4bc8e2d8152663e97bd18498f729c070fc3f4ac91b39c35936e0cd92491d0734598ed9ea96e7c65c5f90d9a3644db34e38a2e01d0
-
SSDEEP
1536:72WSxt1Nss6C5cvZucafNcS3x45Jf1off31/:7aDncnf1off31
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 384 msedge.exe 384 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 740 384 msedge.exe 83 PID 384 wrote to memory of 740 384 msedge.exe 83 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 4372 384 msedge.exe 84 PID 384 wrote to memory of 2872 384 msedge.exe 85 PID 384 wrote to memory of 2872 384 msedge.exe 85 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86 PID 384 wrote to memory of 772 384 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e274b79543108d58e768641c7e4ffa9.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3e7f46f8,0x7ffd3e7f4708,0x7ffd3e7f47182⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6376267248314260734,2269665054705357677,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5b484b5392d1c1dfa747fbbf47456be6b
SHA118af50139b190fa94909ce64bb705efb2151280d
SHA2565df1cb195dd4e2a6012d305d93e25577f1571ddccbb6c1862de9e09b87e97b8d
SHA5127eb3dbedb758aca4394e3642548fd880b71c46317e380796f4ea3b5baaa567390f1d7449a31665647b7992707c0d41abd27347f05d151b2e9e8eeb9bbc4d8464
-
Filesize
2KB
MD54108cc9531b076ab70c94eb4574a7e9f
SHA139beda1bdaee7e884f43aaa3a144c133d7b506ad
SHA25624268d048bf70b0b44bf7095634ebd1d29e61f3117f2e4f373a5a066d22a4eec
SHA512d21e48cb21364888b4d09cfa9b6822b60ff60ee44c04b96a7ea5ec3f945b6a26b98543540e8813f0210252b3eaed140e3e60244e5977117f5e8619b0ff6d5e12
-
Filesize
2KB
MD511b7f042c14bd2cbfb03570a0953dae8
SHA18924315a63244fa4e1df3c92bfa36813ee69afdf
SHA256ed5b51f0baec42972c1c3071b4b161dd509a23f2909b4f8d085491592ab21222
SHA512246186c24ad926bff7577cf41f6583a4f279aa7cb59895374296e0889a66ca39eba6bfac36510b96efb26fc74c36f1701a273c042b3ffa38b7624219fdbca874
-
Filesize
5KB
MD533cf5d81a34c6b4142e05ebf86e62b77
SHA1a342a857d0619398dd15bab5e0a0673bf43fed27
SHA256996e0bf7453fbb2f765547ed812548f7f7b53040ff6b07afe69f508827783644
SHA5122c4ed4c8e4f62a43dfb496e24164534e8a6909974e45b816f6098e975255aff022f943ee031cceb11c89a034f7bf17c359744de5725a2ab6236b61b746905c32
-
Filesize
7KB
MD544cc8291ec7908a73f0310b734353241
SHA196eb1f0b8726312f5f9c9b557adfccf05afce341
SHA256e990650ce05fb87880a00bc5d6fc0d52049fda4401ceea5bfc3e67034180550b
SHA5123e0567f2eb48318381e7ad5345724fea00556225e42505bf6bca7e9988d70ed238c978d52ec4010766c3f1588aa91b2f7ea987c2a9df91adbc1b6a32915eae0c
-
Filesize
10KB
MD51d6313849e382f8805c6748c30490ee5
SHA1d791e4fb9bad922e227a71f2e6f0a3b69d20710e
SHA2564ad22c7a0d733036e57e2f1afb80a2f5a45b56f39b283f54b8b6c4a40e4eeabf
SHA512afa2b413c313d020a49eaf111ad897d7ca1b1a28de9bfa08c48a54c0a81999a4e9ad4a6fa354c4ee51d382f271ae2d8ea09332b4fd9a9b94cb96593dd1f077f9