Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 06:38
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_235d2b77dff8818745e0d6579ff0b9fc.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_235d2b77dff8818745e0d6579ff0b9fc.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_235d2b77dff8818745e0d6579ff0b9fc.html
-
Size
43KB
-
MD5
235d2b77dff8818745e0d6579ff0b9fc
-
SHA1
dd7613ff94010cca8e67a92f5cb7c69d333f0128
-
SHA256
4b563a153e8d75151e89bf6976f15b9488298eca20eb611326a1c67f96bfbf17
-
SHA512
613e1dd3ff76d2009e1043031bb260ebfd28b27736a36c4ec387b4756b709d82709b174076a10f7dea205b7789b2daa958c56ba911a0ce0303fbc7e4d46bbf0d
-
SSDEEP
768:ADHUtUKuIMkUn2sjwUK8oUUU0UY2BQQpTU4QkDUqQ2UrQeDUpQkUJQPQU1QAUUQh:AzUtUKuIMkUn2iwUaUUU0UY2BPUuUuUr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 3764 msedge.exe 3764 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 2156 3764 msedge.exe 83 PID 3764 wrote to memory of 2156 3764 msedge.exe 83 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1020 3764 msedge.exe 84 PID 3764 wrote to memory of 1652 3764 msedge.exe 85 PID 3764 wrote to memory of 1652 3764 msedge.exe 85 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86 PID 3764 wrote to memory of 4132 3764 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_235d2b77dff8818745e0d6579ff0b9fc.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce3ba46f8,0x7ffce3ba4708,0x7ffce3ba47182⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,10258670212601013006,6476487593811702350,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,10258670212601013006,6476487593811702350,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,10258670212601013006,6476487593811702350,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10258670212601013006,6476487593811702350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10258670212601013006,6476487593811702350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10258670212601013006,6476487593811702350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10258670212601013006,6476487593811702350,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,10258670212601013006,6476487593811702350,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
465B
MD554cbab05333146b276c830efed20ebbd
SHA135f3669873d51cf5392801dbe6fd3e4f59b57f97
SHA2560dfa086441ec17bc69f5fbff5d92351039d0d49a81e7df988724d38e700496a7
SHA51264c4aeb0c4251248701fe6561f7f6de5098e026d9aff1c25af3fce1098ab1a54ce0018ad11799e08f375bdaa58dbfcb2237ed191c64266c461cff991b037b749
-
Filesize
5KB
MD53f769ab408849f50be9fd7cb60763720
SHA140d6f4d0162bb23a9c1d6f30c3a21d1c9b7be2a4
SHA25623209e777e92a50225c10c8a484cf43b4a3d6d690103a3d317dc728ef066dc08
SHA512a3fdba503e5e7a562340ffddf28a018e37c861816babae5e5e61e8ab1d13361ee248b11cb7859f7b16e1d0351b6f589beaebc30f0a01f1ea4fbca1f2ee321e86
-
Filesize
6KB
MD56970ef69157ed0c3877671d643ac34ba
SHA101bbe112575062cfaef62336abe1701fd8d9fbeb
SHA256e0fb380015c0f0ada582a5d3f2633ed742a688075b7c795b39d989e6f5c3d65e
SHA512b49a371a5f9a89cb7dbebf7f7bd1d5f3b454292cc7ae7b7bcf33c93954a52f0001ae5594c0faa674c99575186ed8acae2afd0470d1e80a28dda215170ad75452
-
Filesize
10KB
MD5d5aa3658ff773c54adeff22af8d99aa3
SHA1a32336bbe9cf8b9ba4fc7608e5ffd131ccb73cc9
SHA256a1b3646093881668f25ef7a076356268f0835b12a683bfe7e2f1e7ccb5c85002
SHA512fef600d649a5a51b568ed3c18eb31a0529373b543ffdb51abc7755d330beba9020616b0eca119f6f0d874d94a23b9e2af082fc2a898e6de42469996d80c2e800