Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 08:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5238d85b5dd24583b0994e6c9ff29d48.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5238d85b5dd24583b0994e6c9ff29d48.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5238d85b5dd24583b0994e6c9ff29d48.html
-
Size
76KB
-
MD5
5238d85b5dd24583b0994e6c9ff29d48
-
SHA1
f64751c71aa303744f94071d2ec0c73ddb8e10f1
-
SHA256
4f3580c960440ac5a20e4e00fb0d8082bdcc95825a49fe53626057d21ee4dcce
-
SHA512
d727bb1d3754cd1e1de3168f378cc845254b772c060dc46776247689a8cda3a1d1d34f656e4f56d866f608c01e932b6e58a17d6eec733376198f78da4aaf7890
-
SSDEEP
768:KwP3PkUoTxh3t/OmC0f13bI0Idww+TXop/j4IUm0/Mq8xLIE2ItDcoF:13PkUoPtRB7wWX0/j4cLIE2IyoF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 2352 msedge.exe 2352 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1632 2352 msedge.exe 83 PID 2352 wrote to memory of 1632 2352 msedge.exe 83 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 1424 2352 msedge.exe 84 PID 2352 wrote to memory of 3004 2352 msedge.exe 85 PID 2352 wrote to memory of 3004 2352 msedge.exe 85 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86 PID 2352 wrote to memory of 1216 2352 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5238d85b5dd24583b0994e6c9ff29d48.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6cca46f8,0x7ffc6cca4708,0x7ffc6cca47182⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,14990683052054096946,8928905649581351271,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,14990683052054096946,8928905649581351271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,14990683052054096946,8928905649581351271,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14990683052054096946,8928905649581351271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14990683052054096946,8928905649581351271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14990683052054096946,8928905649581351271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14990683052054096946,8928905649581351271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,14990683052054096946,8928905649581351271,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
524B
MD53e55cbb56e2c070bf47afc4579370073
SHA150b6fb50b223c5ef6722398eb119c67c854c0150
SHA2561211e8d0328fe4629514bf73ed042cbe76210130cc3f3441c2995cfbb674dcd4
SHA512397f57070de2497f6e51559dbcff646353bc71bbba67a7a409caeeaa641d311a99f53728efe52c419564ab7d8f0834f9f7048a909541fec85f92556de43ed522
-
Filesize
5KB
MD5e53c540efdbad66db95f2e787c1975ee
SHA1027ca2e37b3c7e1679974f072f261562d4ba4e4e
SHA256d2379f7c691229a386bcf97e64b13983ec0fef269589f3e109c6ac31d6fa2331
SHA512e16d1bc42d97decff96754b2a0a74fa18c42604f061bcb7906ddc2aeb10f0a579d9020c646fd5f44a16a1dddc1d8920ed77960eea11800294d69a43dbbfcba46
-
Filesize
6KB
MD5c20641024baaba099dce6e32a79a3a56
SHA1519cb71fdb402c7182948f24f6b8026a5d4aebc1
SHA256115823a98444e43f529f9cfac37fe2906b7378d1a25e77a45bc84164f1bae5d9
SHA51286e847a642ea78d9940d3912c29b5da88838015e394eec4ff24d34863334b32c4376068e706b0d6e77646767db63767d1acd2bc21a10c188930822a9a66c7818
-
Filesize
10KB
MD59c9af0c6df3f9bf5de538a4a4d0961dd
SHA153357c7885aa258b34942ebed3d803415bba7881
SHA256fc2c9024cedaa14f15b60a40a5ffcdc6375cf937c32fe0fbe7761bea7bfe78a6
SHA51250ab43ec3007b17cac565f1acbc55cd1417d6584d09c4be6cd1a7cbd15c3a9b04e9bc51c0953cf8d9633a135fe23d2fa1e75f9655bf57888b2a1ebc0d60bab86