Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 13:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_100b4e2dd02d807226115039eb98e03d.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_100b4e2dd02d807226115039eb98e03d.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_100b4e2dd02d807226115039eb98e03d.html
-
Size
86KB
-
MD5
100b4e2dd02d807226115039eb98e03d
-
SHA1
a3bf0db9a675bb02a7666142c3e3548914b6a611
-
SHA256
68096e7f568972f220895bbe0824ad71bce858f0e890036e903a288f4fa2f9cb
-
SHA512
4400217792e918970f462896f9af30b1484b3a3ab4cfef7f91148338b122515fe10c4d451b8a0b8543332c241feb6c9f2337f9f5999257bb10004ccf851958ba
-
SSDEEP
1536:DF5hAiwtLQA+wDJwVO6nzXPn7hM4odehq9Md75+dfPFZ:DF5m1t0A+wDJwVO6Dodehq9Md75gFZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 5052 identity_helper.exe 5052 identity_helper.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe 2528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2896 2528 msedge.exe 83 PID 2528 wrote to memory of 2896 2528 msedge.exe 83 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 452 2528 msedge.exe 84 PID 2528 wrote to memory of 3508 2528 msedge.exe 85 PID 2528 wrote to memory of 3508 2528 msedge.exe 85 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86 PID 2528 wrote to memory of 2620 2528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_100b4e2dd02d807226115039eb98e03d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab28446f8,0x7ffab2844708,0x7ffab28447182⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11397045278353870457,14742686675219495477,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD587b8f1a33f02dc4b7b8386a2b588ce44
SHA1f57bd4117d237abf91233dbe80691bddd217e07a
SHA2565e13ae02da8ed7790010c51c8b1b641d1fd68969df25c5a658d52d9d04e60909
SHA512a93195c78d58b62d714eb901ac964b00cb66540095d33bfe43688bbd66acf702c9cf0a52bed0fcb18c884bf7604b4428476d87e2e53efad44902b4e6c7be221b
-
Filesize
2KB
MD559d687adbbfb777e67cf458d4d5cc000
SHA1c3f52a436e20da85d5652d71495de4386726e69d
SHA256650ee4a24f048e84ff8a7d95e578476ccf6a87cd1ba6f7c62afff8afcbe0a6fb
SHA5121482431cc735e0ba830d898f37a1d0d87dd027ba73955b0a2a1dfb0182c3cb7dc8c7a3291eb01e620c200da35824046c48f1f92209c758346b8af5d2084b8a94
-
Filesize
7KB
MD5da1ca325303b7f09651c3a2ccaace5a9
SHA181e1d8b846dddf72ec1378c28c64e12b4a5ec499
SHA2563a11d78c755bf1549620bbe12b92462efee7b6997cf3943a072a272aa2a08bbb
SHA512ddc2d78512c2c6bb61321662853e13c3e70139920d1c5bd808eae2fab5c7b0e25e26a9ab2a4e8d6f4c86a4b2834e94a368e6e3d4b1f2df7a2f9be2b7a85b438c
-
Filesize
5KB
MD5f277c36356088f1cfd03a1b771f97d38
SHA1318bfc8b4ccb9399b3560ceea1c959e102ef7625
SHA256499b2751c5fbe79fc69c080227cca626c7d80c87d9a16bfa5eba8311d79ae86f
SHA5126c24403d7ab28fce24bc030c6829903c5094b1079d02ead46aad56a25f2456008fd42a9c36b04d6000bc47d9ee38c6b9b6f4c2c7475298857e35c1140a2ce060
-
Filesize
7KB
MD5c2ccc15e65305622d50f0176eef7c687
SHA1e78d1950c794ea16861bc0c216105b0d62a89409
SHA256a314014a0bd78671d9be560b4c2b514add30f56ce49ce2d0f6c0868642e9b368
SHA5121fb7d557599c89b63b2837d154b7e6ecfad67f5fccf9c6edcd63d56f1990db99918ff132c5df4b0b92f4602bbe5e2f3b7531cb0d0cb1323d7576e414173a0394
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD538179776dd8a09ba7bc71492c18c066a
SHA1782510fa65fdb7b740659cf3d22cd9e2983451c0
SHA256fad7079aa9b2fa0df21ef4bce9aa81583c5bf2e0b92049585b7843dd5c8fc7d8
SHA5121f6528aeba7076a62c539b5f3ae38abd5b831bdff411d6fdab87612d34cc7af4d8d334ccd50e3facc47f073e5fd0aa053cd62dbcf9cb328d5343f6b05c0fa888