Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e28b666d99506d9d2584f35626f12ba2.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e28b666d99506d9d2584f35626f12ba2.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e28b666d99506d9d2584f35626f12ba2.html
-
Size
86KB
-
MD5
e28b666d99506d9d2584f35626f12ba2
-
SHA1
38b356d8ae3c1064e91c87d31c449cce731dbbfc
-
SHA256
4d001f8abc2eab306c0650219c2e6bffe45c02a4714ecb4c388cffc878f0460a
-
SHA512
568e81505a57da85829962e5b408c51c657ded906743932013fa77004f895d1c323e3b506e89c80232f61b531f02dbafc01c5cbc745be110bfbafaccab0a8b2d
-
SSDEEP
1536:f5Orm46B5ndFySVsZOeWsdLPccaw6E6z3K+IMz+5m5EwpoNJxtWdY0ywefYRkHX4:YseWSprSwes5Dc3BuymK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 4704 msedge.exe 4704 msedge.exe 5076 identity_helper.exe 5076 identity_helper.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4284 4704 msedge.exe 83 PID 4704 wrote to memory of 4284 4704 msedge.exe 83 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 4888 4704 msedge.exe 84 PID 4704 wrote to memory of 3284 4704 msedge.exe 85 PID 4704 wrote to memory of 3284 4704 msedge.exe 85 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86 PID 4704 wrote to memory of 3748 4704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28b666d99506d9d2584f35626f12ba2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec26e46f8,0x7ffec26e4708,0x7ffec26e47182⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6387725661803955238,6667900948820023126,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5a194914d3600fe92537f39160a1244bb
SHA1ff0b4bd5d0a6fb2e6e4c68c11092ea06c455faf0
SHA256a916c407cc2ed8369995dcab5e5e23056c8a9b9108fc912f6cff59bd08cd1fd9
SHA512e7811aac1ea4c9664b67ca37094626023490fa058b589ec5fc90a7ac28e3aa5a0720ae1659a7036c2155b82f81d78c74112325c3fd977a7632252fe89c4ea4f4
-
Filesize
1KB
MD53e64b4c89513bf2b425d45e86ed47d58
SHA19d7762b1ad862b4b75d6f59fff71b15ea48e212e
SHA2565be7db206ab1e069360ef7998eeb3a0562f94618f59097efb0e912a2e77b20ba
SHA512d6e5389288958d524e9ccb9be363a73a35ba214483b4a5db365ec50d1161c47b59314ad41229adb94d5ee288f78edc48c3797fc69fd779c77c4f10de1c8a1611
-
Filesize
1KB
MD58d99e9c949fde1ea0f52d042d6e1a52c
SHA1d835b96b82950142e408b5f788fadf9633c1736c
SHA2568d29cbf6724354bde47dbd6cd9d5d6962bf273f222931ed4ff984f5688fd1b0a
SHA5129fca0165c52de782982025bcfa3fb8279bb4e5606f59195097300cab8cd45980f13ca6812744b1ad537463d1fb5f621e4b8d408d615209b4b7ea94f2bb498b6e
-
Filesize
5KB
MD546ad83f88b992b2158d27380e2bf3f46
SHA12706f1f3ef9727c6e7dd25723e5641fbf10b5a31
SHA256370460e4f1a51853167c66a464d4b0c8915630c49f8666916484767789ce935b
SHA512d7e327f81ca5f2faa821221bf2134c6ff16262be7f720515d9b2fae924aa1951e78ccd2e51efdb2e087b8ae40dd532c07730b3a2ddc905009e3d8291628d35a7
-
Filesize
6KB
MD5b23a7e67a5de7a13562238b8ca38c651
SHA10532042a61b5bfa3dc1a7ac4d2a494c973c1a495
SHA256d219d3f5ec0295217cb0d9dd54f252a388041559cfe45bcb2e541e1adb378240
SHA51214994f09a99c4836049bfbcaae5c4cc1a400bfa367bf504f8951c163485b423482ff11e0d5180b64e3289d12b6fab222f4c3b96bc0dddad9b15646b609560b06
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD583f8acce945a6827ea66b54d7140a1af
SHA15802d9214fbdf8ddf74fa84636dd9ec669751dd4
SHA25683f24a0eea248eb961f5a9d535a3454b537b337c1ead6754d34e5b3fb67b2e6e
SHA5121f08d20a4dfb3049bea21c28cd5970995baa2178a382a67cbf5692de3c5b3ca29c742e0685f3244348f506e8a8dcf278b4513f93911d053adbcbb45377a672d5