Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2954a848c693085b5fbacb263b5c7db.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2954a848c693085b5fbacb263b5c7db.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2954a848c693085b5fbacb263b5c7db.html
-
Size
47KB
-
MD5
e2954a848c693085b5fbacb263b5c7db
-
SHA1
5be628d681092c09f3ea37212cbfdc3f537c46a7
-
SHA256
7ea837fbd419c2f1a0f3f50e95b7fcb252bfa1061e87e9a1ce63a2d64da2bfd4
-
SHA512
27b48e5389f3dccdfff98ecc7ab5a4b61582a1d7a97e67a91a5c9ee482fecbd8db504d956c96f5c133cb679b1dd2ec295972d1ffb9920ac56a92e6ac8a5ff2fc
-
SSDEEP
768:mSHSSStgoEbTsBp0MLOez5aCyonDxVkIbPn2zBHxpU:mSHSSStgoEbTsBp0MLO25zyonDk4Pn2C
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 4924 msedge.exe 4924 msedge.exe 5092 identity_helper.exe 5092 identity_helper.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 3528 4924 msedge.exe 83 PID 4924 wrote to memory of 3528 4924 msedge.exe 83 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 2916 4924 msedge.exe 84 PID 4924 wrote to memory of 3140 4924 msedge.exe 85 PID 4924 wrote to memory of 3140 4924 msedge.exe 85 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86 PID 4924 wrote to memory of 1916 4924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2954a848c693085b5fbacb263b5c7db.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1fe846f8,0x7ffe1fe84708,0x7ffe1fe847182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7949026247886495638,4962914079583732790,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:68
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
186B
MD5c29c401ad70127d82f9d3678a4eb6b0c
SHA14ba6786409ab2150881cc284415b4c100417509b
SHA256707a3b8c72f7a0e28d61dcb67091b7b3fe9bc63dbd599824eca656fbc9884eba
SHA5126c3b0885e34b7b6b66c7eb787710350f2d725e300e8c8795961629f15075c9d042eaab8632e4f50d187931717223e0a8e7091a32fc8a508eb9cd40a5464b1062
-
Filesize
5KB
MD584f96fa109470212a425097c67e0f970
SHA128bfa99d06cbde0574e28c51ae321770fed091c5
SHA256e828467d588af948ef328b4626abe04f9b2ad5b6ad61b37e3db6995a5b2c3c36
SHA512d46b9a22c18eb0a36efd5849ab76e158592ca8c396cec091433e0d83bee09c22671a369bf3eb125405a9fa91795bebf8dd2ac1dfbb94d93edc2382ce52e72ca4
-
Filesize
6KB
MD5e2526e81d5d0a9c0d33189762464012f
SHA12372509f549c3b513fe61bc7afb5542bfbf8f293
SHA256cf4f24915ec7ad4b9ac623d9e7ab1c6201b6c19a7355bf7bfc2d337cb0b78e64
SHA512572f05f73b1250b5d25cb65266fb8cffb785bcb3e57cbfb2de8fffaff360940d447bbcf24b071335f46acfc37c22ff003182dbdd668d2a9bef7ad259bdedc53c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54c0429c85109eab6f8dba5edc2fd2152
SHA14762c43c7b9e68af4b10a5941bfda410d3d5471f
SHA2565b83b7ce50842a9659e5940bcd415f618f4d6a604af63b70ed1f6addc833cd1d
SHA5120d9565b3a0bef8a159ae3cef426d03c04f5bf33e4d0aae839a7052fb180e9e72f41d1f9abe9eb28d3f24c99805dc10ed837cd34baa54fca55613e60919df1e37