Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:12
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2a131a04d3245f614179a7985b82950.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2a131a04d3245f614179a7985b82950.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2a131a04d3245f614179a7985b82950.html
-
Size
141KB
-
MD5
e2a131a04d3245f614179a7985b82950
-
SHA1
535a3e32ad95bd50eefa8145a511a0f804f36cff
-
SHA256
4d125cf1fe381f0972fa7ce390c1c37cd6a0a3a5ddb87a68a2ccfeba1d4bf249
-
SHA512
292e40724c4252dea7a884ddf3280a4db934a58b0a18d9b3644c0e440544e78a14c95761bd96668e21c85852d95445caff5cfa8625d0381746097b5f43d5c6ed
-
SSDEEP
768:QSbJEXyCZEfc93Z1jCv6kdAqufZnVVZfC6muQPaEDLfDfF7ws9+w+iyy:QGJECCZEf4CpqnVVZfC6M9f5w9w+iD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 2064 msedge.exe 2064 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4692 2064 msedge.exe 83 PID 2064 wrote to memory of 4692 2064 msedge.exe 83 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 3140 2064 msedge.exe 84 PID 2064 wrote to memory of 4492 2064 msedge.exe 85 PID 2064 wrote to memory of 4492 2064 msedge.exe 85 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86 PID 2064 wrote to memory of 4616 2064 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2a131a04d3245f614179a7985b82950.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde21a46f8,0x7ffde21a4708,0x7ffde21a47182⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7868513085041614567,1841183330584766893,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,7868513085041614567,1841183330584766893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,7868513085041614567,1841183330584766893,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7868513085041614567,1841183330584766893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7868513085041614567,1841183330584766893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7868513085041614567,1841183330584766893,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD54a60e2a415e3a1a0ec237ccbebb683e0
SHA13f9cd9c3edc53c5c4d774772c245b5a44f5022a6
SHA2563ba82fe9fc91ab8779d5bb67926c9ddddca76b2d5695d0ff476132f266b792a1
SHA512ddc6bb1def950ed7380a469471eaf0e7f7a31af8f74b99f86898cbf06e4c3b69c50f516126ee537511203547c1c8d78f5a9764304b29f624cca5b3d5871ac161
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
1KB
MD58c9b4a454ca2aa8676439c08cd26735f
SHA1576758e7fede775edd8cf99f96af4437a0ea0d3d
SHA256b0e771e5b3a69b035b809742b1e82f900799560a8c20a58e66666749aa94a80b
SHA5121c0d34f7bcb4674291c5d30766b24902dd9a0e8e4d3bfd439434662190c1828e3d265c7b9a189bd2125db6375d1560b9cdc554c6fcd63db1e4dc8e6ae1991c25
-
Filesize
5KB
MD51195cb4594faa9e2bd73450733aaf7bf
SHA198f012efc621eac5840f13bd60dd28d479ec58ce
SHA2568720abbbb7e76ad4a7e962fbf9684a5892cb6d4ffaea9abac283e40b5adf45e0
SHA51206266891e1dbdfa45858049198f041e89f865ee67cf5d629cb5e3c462c02835c409d07a381e184fbb848f6597fba834a71e63beeadcd36e9b0f98a2fa3c3eb1b
-
Filesize
6KB
MD5792fd1e7db786bf902a22ec1b3f94699
SHA1159f32f5b5a7529d8c5b4ba64e2625ed05242d5d
SHA25654497fcf7428ff05abd2d09242b4a7b20fc6edfc811330d6542b23b811cc9494
SHA512e88ec49295d917edf8679f0935ef7c3e9809d2060c40c6d9a3a38969a8432eb172b1154ea3722bd2cc5d42457d79b072071d939ab107a89d9b959cf9fc7d81ea
-
Filesize
10KB
MD551ee4c8fd46a90083c8f1e853bef991b
SHA180bfe3a5f758e0374b41ccde1dd94dbc7d59b068
SHA256fbf9f23911c76f154c4166d00fd7ed8c6d542b47aa68abcf88db12ab01f4aee0
SHA512272caa7725af0bec6fcc934f92992bc282e8ce68ac6315bc5ad1a17393d415ad9709350236b6a547df233b9e854fcf0530c71a4101b5fb529c26f8d66b4efe3d