Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2bdbf022349a0cc61fd7a936388df4e.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2bdbf022349a0cc61fd7a936388df4e.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2bdbf022349a0cc61fd7a936388df4e.html
-
Size
6KB
-
MD5
e2bdbf022349a0cc61fd7a936388df4e
-
SHA1
975df6a831c4cfb8c10b00ebafdac6c86bec9805
-
SHA256
6c08d2778378f053d2204889edf6f4e556b855dc254d1f6ff2616bd90bf27cdb
-
SHA512
1e1c2eec26dac52d8e859883beb0473d0bd2b41e3467ecda355f27b76fd4f5474ce8647a2a12aabc837dc066c240245b6a4d42283a73c2bd61123c8f1420dbf9
-
SSDEEP
96:uzVs+ux7WPLLY1k9o84d12ef7CSTUbZcEZ7ru7f:csz7WPAYS/Gb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 5056 msedge.exe 5056 msedge.exe 4552 identity_helper.exe 4552 identity_helper.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5056 wrote to memory of 1120 5056 msedge.exe 82 PID 5056 wrote to memory of 1120 5056 msedge.exe 82 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 4952 5056 msedge.exe 83 PID 5056 wrote to memory of 2780 5056 msedge.exe 84 PID 5056 wrote to memory of 2780 5056 msedge.exe 84 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85 PID 5056 wrote to memory of 60 5056 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2bdbf022349a0cc61fd7a936388df4e.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff837e746f8,0x7ff837e74708,0x7ff837e747182⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14579392797696656347,15927408650149298595,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
5KB
MD5b705723396533f7e755467306c938b81
SHA1dbb84abfba83b122a0d855aff2e763bdc264347b
SHA256d1bcebdeb48a90ed9bb453d91cc8adebe58fee8c1024e5d791bf2f7d22daa6d6
SHA51222a0709c5698cdefebb8374f2e2a823f9393b6a0a2def27b2adbc0f63c05d5cf294855779464a8ff4d145edf18670947185fabd24f4b455decc9317910de6212
-
Filesize
6KB
MD57d65cc914151e84536a1c3d08a5d97fe
SHA13fc11a32da496928af10cba79af7a826b9827bfd
SHA2563ea213f07700eaa80eb96019c22db2c85db1a51cfdad744c52d7ecdba83ff0b0
SHA512c87c96ef8e3be0b87500a03350f10e2aaf7552e2fe39dfcfd603d4650362600541a6d24d44f8776bfe69561ffd99f222928900243ac0e8e8b15bf10929783885
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bf21ad306f08457f68c0e65eaba81ed0
SHA12e4b76a4c7aa6babbe1579d2d1df7572a8683e73
SHA2565470e6deeb86d9e72a962d5e8b5b924fdbcf7433c8a3dac057808b7eb077fa99
SHA51272d3962a32da2fecd5e95dc7a03333c91a58e3b738696c4d6c73e0973055ae30034b1160ebcb5f744d8d7107fa8a4d543022936bd63cd182cedfa7a3c3d62944