Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 22:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_473f041a1e04fe97c1e53b7526f0dd02.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_473f041a1e04fe97c1e53b7526f0dd02.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_473f041a1e04fe97c1e53b7526f0dd02.html
-
Size
26KB
-
MD5
473f041a1e04fe97c1e53b7526f0dd02
-
SHA1
dfbc8ab47be74e7c23628591d14a68a6ebb8606f
-
SHA256
4e2c49d4f340d0d676a5cddfd932afbccda0d93dfd65933f3563a5c2eb673e67
-
SHA512
257da2aafb53a1b93d7816643dcec613982bfb0e4390d193a13f9a34ec0f1213fa18c3421e98c4187464739cdd3150e2b9dd62099a9a3b1d4aec8c9276763dcd
-
SSDEEP
768:c9mkvNo0XwgkLnKxENLENHENEjx0jhqbl51M22:GKzJiiwxK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 2420 msedge.exe 2420 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe 2420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4412 2420 msedge.exe 83 PID 2420 wrote to memory of 4412 2420 msedge.exe 83 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1652 2420 msedge.exe 84 PID 2420 wrote to memory of 1484 2420 msedge.exe 85 PID 2420 wrote to memory of 1484 2420 msedge.exe 85 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86 PID 2420 wrote to memory of 3880 2420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_473f041a1e04fe97c1e53b7526f0dd02.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce3ba46f8,0x7ffce3ba4708,0x7ffce3ba47182⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17744949339815050539,10147039898185429180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17744949339815050539,10147039898185429180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17744949339815050539,10147039898185429180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17744949339815050539,10147039898185429180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17744949339815050539,10147039898185429180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17744949339815050539,10147039898185429180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17744949339815050539,10147039898185429180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17744949339815050539,10147039898185429180,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
1KB
MD5226d26885e1f03f37c79d58e0383a731
SHA17571581552a4fe7922aba3a0945c40e2db003e87
SHA25671d73e54580cb0b6ff99344d8396fc9213e9a5060ad911be6b5cae62b92ae2e9
SHA51232b2df19a81168b907ba191ca23a805d5096ef4ac13912f250df2beb6ece9a4caf6410549f76b556b8899462f92b2d4d4a05a4d97c5041104d76b1f320fccdf9
-
Filesize
5KB
MD50fdb9f4ff3a8d348568c2c067b1007dd
SHA18e55e0f959eef6ab00171fbdd61baf1d09820e41
SHA256c4754b807a3dcd6b05c22c918a4bfbbbd99e2a617383a5d599bfcba132757708
SHA5122c7aa183462d0aa4fab974966d5de585ea8a34175496d4dd72b7f7621ac6ad0afab1ab2d1f13ca585da1746c9bd3cff6e104c9c9dcaefbe4150f52f6c01d7390
-
Filesize
7KB
MD5b2ccd6fff526dabc154c9897af049577
SHA1c6a68a18b76a286bb6fc30bc86a48248e2438e91
SHA256d374d686b853018f1b14f3158f1c1c215d968e801a6ee0bc50b126954c6c8d5b
SHA512eac6c37031386f6e933006b5f2e222d2988b74577a6bfde09218e5a0dbaab90aae60943382702950f3a4fc5076c5b267d7f79bfcd0f2f0f1d1e8f6224551973e
-
Filesize
10KB
MD558b82c7b725e3b04a61825f747042ec5
SHA13279bc7d467e6071c582904003a9f1d25780901d
SHA2564cb7861c52801257c5daab693d041d15afd7461954bb55125be2a70d22e0a05c
SHA512d02e796b8201bf77e387d02c587208a2b895bfe7ac1c2c7d0e7877afe40a747b374a2c8f173d7a8d95efff98ec5a20afbbc272c5870244f565094e3f7b023662