Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 04:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dc861d666de507650d3de3fb322f279c.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_dc861d666de507650d3de3fb322f279c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_dc861d666de507650d3de3fb322f279c.html
-
Size
47KB
-
MD5
dc861d666de507650d3de3fb322f279c
-
SHA1
49fdf8942316ee88f40fb9ef884a6bf618ed0de0
-
SHA256
a79d91cbb9dcdf5ad0dd32120868d54a3b82c7022a447d7c8c78f71ec814feca
-
SHA512
1ec7213f86a3b7f254d83c3ebb502c63c7b7d069d9dabadde5bd0ce35cfeff2d1a4314dd03291ff3918174deef3db8c5d426271065d41c69c6a78251d85656e2
-
SSDEEP
768:pDxUtUKuIMkUn2sVwUc8oUUU0UY2BQQpTU4QkDUqQ2UrQeDUpQkUJQPQU1QAUUQ/:ptUtUKuIMkUn2WwUAUUU0UY2BPUuUuUB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4996 msedge.exe 4996 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 660 4996 msedge.exe 83 PID 4996 wrote to memory of 660 4996 msedge.exe 83 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 1484 4996 msedge.exe 84 PID 4996 wrote to memory of 4060 4996 msedge.exe 85 PID 4996 wrote to memory of 4060 4996 msedge.exe 85 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86 PID 4996 wrote to memory of 1508 4996 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc861d666de507650d3de3fb322f279c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce3ba46f8,0x7ffce3ba4708,0x7ffce3ba47182⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,3212924208318604524,7961595753409502483,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,3212924208318604524,7961595753409502483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,3212924208318604524,7961595753409502483,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3212924208318604524,7961595753409502483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3212924208318604524,7961595753409502483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3212924208318604524,7961595753409502483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,3212924208318604524,7961595753409502483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,3212924208318604524,7961595753409502483,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
465B
MD5f6f7ad45d351585ea0cb9e8f245951c1
SHA1fa5cc3ab16060e9b20e916aed106821f75d7b1da
SHA25634fc162b5ec5337a0711b4c3d72a3be56c8fa17ce2ff420661ca175812231ea2
SHA51274d6008d4b0d86de622a213d7dc07a52607a8aec84d7f5c11d850aa567125b34b31735f964ea20abe850942388c3dc5b48d5af29a31e24007d891246905686fa
-
Filesize
5KB
MD5d46add685125db416ac58dbf130e8e58
SHA15638c3bb976d0b17a8204d7231d2da08802f5aa3
SHA2565bcbf0079cd630934fa3a95323bd275dff37aad2cdab689ae87c8131e362244d
SHA5121f7179cdbb059fba3715626736f7cd8661d81e87dbb7e5a98141ebbf4f1448b45acd9f0147e043fd3f79530c444016e5935f4c425829a12f865c94df5ee7099f
-
Filesize
6KB
MD539cab42629c6954052a528cd63b7f991
SHA1d1cea50d56e009ae3a0e335bbdef6cfdc592e91f
SHA256c04dac3b011a1b6464e3fec0ec328d10649d627584cf283594a3dca17f056b09
SHA512f223cb00dd8c662c248b79fa102206bb8dc8f5aac7833b2094195eb08352fab35240c96cfad2b7a97d852e7642a3e794b23f337c00a831d9f94037a6b926b735
-
Filesize
10KB
MD5d275378094fbe565899cc384ed5902cf
SHA1114bbb66e00ed9fea62832e96518114a70a8f69a
SHA256a3dd9253ce690e24daf6a4676cb8dfd4f685ad320b2e5a0b0b5926df5b271f87
SHA512390136981d025a8942a6a5480ba64ca3e3b7cfdaa35dcf09de23616d24d955289daf6d3285af378a29ef2746a7c078e436fe0a7edf2999bbd6537730979ce08a