Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 15:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7a9ca718e863bd25a2f209dcab26bda6.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7a9ca718e863bd25a2f209dcab26bda6.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7a9ca718e863bd25a2f209dcab26bda6.html
-
Size
106KB
-
MD5
7a9ca718e863bd25a2f209dcab26bda6
-
SHA1
25cb15b9219313b71caae58e2086255ba6db7b23
-
SHA256
4bf74d9eabff4c8d85d76578f3fdef2b3b5910438084fd2897ebec4edeb8a8f3
-
SHA512
bf622707ac2738919cf9c490ff4d3fde51596b344c3f453491ba855ed34e7efd1fb8677c6fa19b2ca257d00c9165a886490b0cac374dad38591a98ee78f8657d
-
SSDEEP
1536:t3PkSoYtRBX1kzGWHhqGoerPyFjGKRf/j44LIE2IyoF:t3PkSoWLX1kzGWBqGoIPyXXGoF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1096 msedge.exe 1096 msedge.exe 2000 msedge.exe 2000 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2792 2000 msedge.exe 84 PID 2000 wrote to memory of 2792 2000 msedge.exe 84 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 2144 2000 msedge.exe 85 PID 2000 wrote to memory of 1096 2000 msedge.exe 86 PID 2000 wrote to memory of 1096 2000 msedge.exe 86 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87 PID 2000 wrote to memory of 1260 2000 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a9ca718e863bd25a2f209dcab26bda6.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfcbe46f8,0x7ffcfcbe4708,0x7ffcfcbe47182⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,4209449197434353588,6229078765896135045,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,4209449197434353588,6229078765896135045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,4209449197434353588,6229078765896135045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4209449197434353588,6229078765896135045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4209449197434353588,6229078765896135045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4209449197434353588,6229078765896135045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,4209449197434353588,6229078765896135045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,4209449197434353588,6229078765896135045,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
524B
MD57b8263530b2a5fc793c00558dfdc8c98
SHA15a60d3e5529213549230114a07d1a646bd7afae8
SHA2567143f0289e8d5f146ac04447a90bd57d7a297dce4ef9c5766c34a8f4f2a72d6e
SHA512c231d4d6feee1b9fd553aae1e425b84274f32937cf140dfbb319fd7a34df55e529b1a0b3b6c4bc11bca88dc5df6d7eb9c7469808cfc74fd6669de0d772e8272e
-
Filesize
5KB
MD520b39060b04c48c34589a283a572e825
SHA111380b38d8ace4fbbfad1957e103690486dd0715
SHA256c7ae4f3dbac4203a2923dc66fee00f4d82bab49b36f056f4a91cfe9dd42e8609
SHA512298c9b9059c0c7e48da7def15625238fbec43cac90fcd598a88a3f72075c9e11515da59c0cbbdadf91beca51b62e0d4b0cbaaa34887d10785d89373f1dace29e
-
Filesize
6KB
MD52382858bfe1b2d32afc8ff5d30ec63a8
SHA19dfac2017e7c5672853c93b05cae339099568a9d
SHA25666d654a4c39ca2f9d0150df7536ec366fe0fdda58cd4cc18c138ef4efaf3d431
SHA512918f04d49e3f31701d2b3cfbe8a79dead79646168c1e763d3f4b208b455fb251339357b824239f88b0d0c7ddc74db08702c8216e06562cd192a5785559a995e7
-
Filesize
10KB
MD5e52700e118fbeef963bd32bb072b95b2
SHA1a498f4ed4fbc0e9dbe42876988892fcdfcf0e505
SHA256537c504a01ae99a06d442816524b2923f53e68ca13f689fb91c8f02525c0b401
SHA51272a37995e51a209975ed08c3095dac869ee7766b289f8a170f86e9ba7623cda3c9c032332abb93a1604c6a071c14c9f3e7f485619cb0f9257fb1489291951ab1