Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 14:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_cacd42845b54ab45b6daf29965859828.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_cacd42845b54ab45b6daf29965859828.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_cacd42845b54ab45b6daf29965859828.html
-
Size
77KB
-
MD5
cacd42845b54ab45b6daf29965859828
-
SHA1
474b20aa2fb3ec074fdd0329facbd2b7a5dd177d
-
SHA256
9c893e48f1d03297ebdc94175d7b87a943977ecc7fe421b7c4920a78078c03f4
-
SHA512
ed6ecc6290dc809a097fe97f55955389849decd862f64d0cf12ab911fd7dc60d04cfef32ecd7c9065d1346be2922d6e8d1db756557b13f593f9f45255995f4dd
-
SSDEEP
1536:7B73bmMoTj64+nQaKMKppuodVhfEGnq3FDGllhGlHSxk8:7BnaC4+n1I4odVhsGqVDGrhGlHSxk8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 3272 msedge.exe 3272 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3272 wrote to memory of 820 3272 msedge.exe 83 PID 3272 wrote to memory of 820 3272 msedge.exe 83 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 780 3272 msedge.exe 84 PID 3272 wrote to memory of 2320 3272 msedge.exe 85 PID 3272 wrote to memory of 2320 3272 msedge.exe 85 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86 PID 3272 wrote to memory of 844 3272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cacd42845b54ab45b6daf29965859828.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa90c646f8,0x7ffa90c64708,0x7ffa90c647182⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,9266535787193538736,11256206520066161426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,9266535787193538736,11256206520066161426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,9266535787193538736,11256206520066161426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9266535787193538736,11256206520066161426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9266535787193538736,11256206520066161426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9266535787193538736,11256206520066161426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9266535787193538736,11256206520066161426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,9266535787193538736,11256206520066161426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD51b819103b06381452595f5644262e1bf
SHA18dbb010dcf774388610d82021122f9f88a00e3af
SHA25600967f587182ceab102545336ffd4266e3f3763b9c899e8c528c61e75e523c99
SHA51287031b98042b162bd4c8ca5f7b59bf7b2fd17503fd584b2d6f2fd185b4890784e8bd16eb4c19515c4a234df307feb71e780819bcddb47268c5d58de4491cf33b
-
Filesize
2KB
MD57d9f0c4d1274cab0a1107570d8cd69b7
SHA1f0be92eb7e4dba7629dae931bd2850d16ec719af
SHA256c29d531f9e704d9bf19329accbec51b1054955ebd9f24f6ba8658c1e95ee8262
SHA512e5b1cad48cc3920723eed434f6a54fca00004b140d38e2073b5bd094fcccade8728e1935f6e890fd8d0a21f4a5b2ec14c35d8367de599548d79904e572f5fcec
-
Filesize
5KB
MD5ef58e273bfb2a1c49417a32b93deb0f5
SHA190e184d3f0e588a7774d399a2268174ee6af2339
SHA25698ae83164d3f7d3e412f139c0af95e37726a22776733fdfd941527599765cb2e
SHA51270fe5c655030c9d0ffda1dee21cf7ff59ca856c9626ee3d25f4cedf5bf4ffd97dfbcea1e37aab5fa206bd0eb0e1c79595aec366e0fe34267ec5e1d1325661991
-
Filesize
7KB
MD53874bc72f253b8825ef0f3799a7ca293
SHA17555b1bc7777121292f8e4458aa291e91b841c3f
SHA25672a5a8574fca62d8db2d30cfa5151d9d6455ed03cecaed1eeffd1bee70f48638
SHA512bea5084f14804ba755c301ea70e8f1e9cc263331b5a62f4a163018b709c0be6f0068a653f925867467b2a3a96e59eb619ea14af067cc77c3d9280119f236e5f8
-
Filesize
10KB
MD5ec920b6696d31857f91cdf9d9c8a2e9c
SHA1dcf7ead7ffa3f97637ff17260269675dea1aea1d
SHA2564454d97a9071797e52c0dbdb909ae1d2d42f0f5be61d67620ed8fd4500a2275e
SHA512818129697f9a469d8961fcdf1b3da0d1001131d734f6227721db39f8adf030cb3c02a26559744b79bd81a062eec353c12cffe6e1833bf3efedb30a4b84aee7c0