Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 21:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_61d68b283908c9f175c57f2181e1cb6c.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_61d68b283908c9f175c57f2181e1cb6c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_61d68b283908c9f175c57f2181e1cb6c.html
-
Size
39KB
-
MD5
61d68b283908c9f175c57f2181e1cb6c
-
SHA1
687f0ee5b1bceeaf0927c1d8c1ee4b0298092e27
-
SHA256
aed0f5a82047dff1a7baad1d8d7166de4a431ce331bbd8a2863e0e3004cee383
-
SHA512
fd3707bc4f29a24e0bcaffbd003fef2f2930ebc5d8f38b866be63871b2844f5fa3e8728eebd83d0bb48d22e1aa596d6ac774b679f6f7aac38046b71d1780a61d
-
SSDEEP
768:SE1ikkM61pves/gES6PG/CBzR70Uc9dkc:SSkM61pv3/gES6PkCBV70Uckc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 1724 msedge.exe 1724 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 828 1724 msedge.exe 83 PID 1724 wrote to memory of 828 1724 msedge.exe 83 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 32 1724 msedge.exe 84 PID 1724 wrote to memory of 4848 1724 msedge.exe 85 PID 1724 wrote to memory of 4848 1724 msedge.exe 85 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86 PID 1724 wrote to memory of 116 1724 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61d68b283908c9f175c57f2181e1cb6c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff869e46f8,0x7fff869e4708,0x7fff869e47182⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,718130505257116316,3123363157715511790,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,718130505257116316,3123363157715511790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,718130505257116316,3123363157715511790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,718130505257116316,3123363157715511790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,718130505257116316,3123363157715511790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,718130505257116316,3123363157715511790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,718130505257116316,3123363157715511790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,718130505257116316,3123363157715511790,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
1KB
MD584381408d35db153f77f7ba7c8d57dbf
SHA1eb0e5bae382c914c2c89b3097a20131823ce46f8
SHA2569c94d53313857182f0c2cbccf811a3089fef3dfe94cc368d00be4bafb85c64fa
SHA5124f5a6e2ba4734a8b4c0b86f8a5f3de5404f221a89e0a8f4706c783b9f3e6d119e306f04c7bef8582b471e5a43549a22845f0bf091699edb60dacff9a9599ba15
-
Filesize
6KB
MD5310140fd46581b4430e75377c7ed042b
SHA17739adc1a2d5aeca5fd99b8ca404e31bbaced8b6
SHA2568d7ae20ed686633cd3e61b5e705d2f5005493fb8bcb8d159a7f5cada9cddfb51
SHA5121e6a22fe6699b56242a4697d2c691458998b5df6c8ce1adb0d72b7de38f216d9f44d74c96e06440e2cbc1437244baca81c3dcd5704bd63789b63ab728d5f32ca
-
Filesize
5KB
MD51d045f91a7cb8049c6e7c9bd855dd169
SHA116cc4c85f92a5d80f52d8d7d3e5ac7e62b03d609
SHA25656ba095d79a2c2126de0b28dd4ec300828abba7cfd3e6b998c1a2ead75b23a1c
SHA512970c2048fb78fd7b1bb43d20c4928606c81ba4bb9745c734f9d382eb69b4cec1dee1e87261bd085303dd6455bdca6ffc9723bba71b5e9ab851d0f7d55bca97f7
-
Filesize
10KB
MD5102e6e8b9ba53a3e6b967e0cc82d371a
SHA108fcbf0958d675503c33fc5f003dcd0fc785e0bd
SHA256abf9057d577551085b630307f63b540f20ed58ed09a6ea55398f1dab0fff02ea
SHA512a5aa17bdc96abd0be4c4c8929b69e2a1a88c1189a74cd407134b491c049ebed9e64d98379aec6fe74158d0f6c50d8dbcf8b2dba42beefffdc094a3fe7fac0149