Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 13:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3db055a417e0253634f2ee6f843312f6.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3db055a417e0253634f2ee6f843312f6.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3db055a417e0253634f2ee6f843312f6.html
-
Size
49KB
-
MD5
3db055a417e0253634f2ee6f843312f6
-
SHA1
3a7eafbfc2ed603ba55332a82578c5d4498a7c7a
-
SHA256
6fc3e5ded762abf64e7c45eaab9df38f83aa6e2e20f9ecb3ac60855dabe27c92
-
SHA512
9dccfbc71455ccbd1391e797a1fd7b729301357254122d496672991748e01bff454807467d1de8cb8446363268c5440fd0bba18218fad6e083de5ba5c39e5a30
-
SSDEEP
1536:ptUtUruIMkUn2WwUAUUU0UY2B+UuUuUDUFU8QU5UU2UQU2UzU2UwUFUOU+UnUDUA:PUtUruIpU21UAUUU0UY2B+UuUuUDUFUF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 1368 msedge.exe 1368 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1036 1368 msedge.exe 84 PID 1368 wrote to memory of 1036 1368 msedge.exe 84 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2140 1368 msedge.exe 85 PID 1368 wrote to memory of 2824 1368 msedge.exe 86 PID 1368 wrote to memory of 2824 1368 msedge.exe 86 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87 PID 1368 wrote to memory of 744 1368 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3db055a417e0253634f2ee6f843312f6.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9189546f8,0x7ff918954708,0x7ff9189547182⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,16155434723163674405,5517289960897744451,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,16155434723163674405,5517289960897744451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,16155434723163674405,5517289960897744451,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,16155434723163674405,5517289960897744451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,16155434723163674405,5517289960897744451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,16155434723163674405,5517289960897744451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,16155434723163674405,5517289960897744451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,16155434723163674405,5517289960897744451,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
904B
MD5a9e6cd2089e73764477043f996e2943a
SHA1034bf845411bf65617b2e77bc53240802e2bee25
SHA256beaa488dc6a1620b072d25bc54245b9ed0d240459d05aa7c4e34cf5123ae9b2b
SHA5128255aaf1532c89a1974bf323c2b928d0fba3442a1e90517a353b51b0a91ba32c246a41747644b24e2c3e98cac97235ae5092d8de8831573c3cd7ebd492acbde4
-
Filesize
5KB
MD50933f20887da1c51b4bc03e5f7cfaa31
SHA154b2cba3e0b21624a46711ff9beffa00ff12a78e
SHA25622d97bcd0ca068cad025fedacf4aa78c1c31b5396b380a41ca630c72d680246a
SHA512b9dea28b2fdaede2708c3e5e7d79ec16d5f00775472733d94dab0f235d193da8a17d9aa71c56af749ab38fb145c48789bd4546fba1e572e8f67b85ca8f6f039a
-
Filesize
6KB
MD587b199571cd2aa808669a574af26c8b8
SHA1590ff9444cdc67e89f868e65ebd0c3a5030047bf
SHA256d5899cce171254d49512a261b998666277e797a82e26ef22ab440b6f5a7c5e38
SHA5128f93859bd73dd89b8da7f42f6ced14d8dd99e0a9cf26e0fd5a68628a4d196da71e08521046b41433f9fc1a6eb673fdc4c677795a35e9793b93e655946b29f94a
-
Filesize
10KB
MD53317810471a5c5823d952ba067b5f96d
SHA10d4be0c1592c2cf01ed1dab5f17abcb57f3d93e5
SHA2568d3c16c00332d2d74352fb463810e0dd6a9af3b845b0592c0fb1e57da3d9c014
SHA5120881111559e6a5ae1b7e3d065cd1f4293a964ab73372a4084edd0ed5a4bc1dc4c3470aaf405929155473fd62e6f11cc1b9eae495515fdd4f0a86761d84aaadee