Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 01:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d7a8a620823106aeed2c0faee16bcef0.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d7a8a620823106aeed2c0faee16bcef0.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d7a8a620823106aeed2c0faee16bcef0.html
-
Size
132KB
-
MD5
d7a8a620823106aeed2c0faee16bcef0
-
SHA1
0cc0b675ec3770c4fde3d26cfb8b01e184ea4b1d
-
SHA256
4ec2d148bb5f983f8d83a8e1c0aa5c04a3dc3fff377e161fe4a48bb9802ac876
-
SHA512
b2b4b28e81a7d6bf95ee0ad2897b6082de99a9960a5f11bf09b5b73aeb9da9183cca43202cfa11984a300abeb20efae0f90b02d32cb4230e0ee3e656d270a161
-
SSDEEP
1536:2uJEEJXFj2RUCjanDD9BVZfkja5Klf5wrw+iM:2sJXx2RUCjanfVZf7h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 3636 msedge.exe 3636 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe 3636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3636 wrote to memory of 1200 3636 msedge.exe 83 PID 3636 wrote to memory of 1200 3636 msedge.exe 83 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 116 3636 msedge.exe 84 PID 3636 wrote to memory of 4804 3636 msedge.exe 85 PID 3636 wrote to memory of 4804 3636 msedge.exe 85 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86 PID 3636 wrote to memory of 1712 3636 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d7a8a620823106aeed2c0faee16bcef0.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5f3146f8,0x7ffc5f314708,0x7ffc5f3147182⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10864035909231019596,15927319966047156228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10864035909231019596,15927319966047156228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10864035909231019596,15927319966047156228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10864035909231019596,15927319966047156228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10864035909231019596,15927319966047156228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10864035909231019596,15927319966047156228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
1KB
MD5188a0d54bbc44572de4deaec33547d06
SHA15684f5234ccbe328318a709fe439c33ca524ce04
SHA256ce4e722222152b00c7842d7063cfed5a246a761cc8e4e73f7659e2431bcb351e
SHA51226a818aa3724c779e777f618b8d0235d4ccf252d048e44216f16fa067cbfca12f81cce6ba5d0b7cf3660f5775b9b859640377fa3680a759704eee0055e283d61
-
Filesize
5KB
MD51a3eb64fb362a640d270d1efab1a9fa2
SHA1a813485233602e6341d904592e9f3e0e6e50dffb
SHA2563d636b90d3e89588486b5c75012db0b4dbb0feccfd09ef14dac5002a8ae7662a
SHA512d1380253231629743146f77600aee4cd0d2a04aa6e6a7aadc810d491764dbe8c05d3043b9c7a2814e76e16a70e3339c4ddc0a65e249649f7d283a8343aa69817
-
Filesize
6KB
MD58a25be59255210e5a988e822dd31078a
SHA17a9733d54e94e1161367ccbf93d53f2e11f8b46c
SHA2561e32a011796429a503cf665e3c9a84f86464c657baaaa8f80d5894f299af9c51
SHA5123496ac8ad021b36a4cb9ccce88286473b181d3f7c03bdc30fb166c7c10b4a8abbe3cda768a0ffc57057e76b3479452c1eeb9e146e6b62d32436d12a98e43e11b
-
Filesize
10KB
MD5fe691471dbd73b912f1b6f2322c99555
SHA1630cf12f449ad3fab9c7e1d78f93a63c422d4eb7
SHA256cb0a0d062aaa6b88f02ab91fa4ad19ef8f12066d53626874efb242f53316a187
SHA512097cbf065d949268d5d8107ddb903750a1932e1532a6e634b85c2fc8e753f51116a2e8f6ddc7164b5b05ca35ddc44db5939d1cfec3eed141ea729f57cf4a1a36