Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e268829cd357453bd5f40f644ba7d7ff.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e268829cd357453bd5f40f644ba7d7ff.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e268829cd357453bd5f40f644ba7d7ff.html
-
Size
6KB
-
MD5
e268829cd357453bd5f40f644ba7d7ff
-
SHA1
25373ca2d1c4a4d6ac1f3601b2ec000beb36cbd2
-
SHA256
a61b2c2ffdd28dabaefeda2187d2c6b1d59aa86195f514174edad8dd1511da75
-
SHA512
64c77d80c312b508dfdd8ef525f7eb4c13928a67b666f3d3673cd15b8b9981e98682ed9fd304a3468a5c7aabf9fc7848a3e5b2383e3a6bdba4d05c080de01a8a
-
SSDEEP
96:uzVs+ux75RLLY1k9o84d12ef7CSTUFIcEZ7ru7f:csz75RAYS/Nb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 1020 msedge.exe 1020 msedge.exe 3460 identity_helper.exe 3460 identity_helper.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 908 1020 msedge.exe 82 PID 1020 wrote to memory of 908 1020 msedge.exe 82 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 332 1020 msedge.exe 83 PID 1020 wrote to memory of 4568 1020 msedge.exe 84 PID 1020 wrote to memory of 4568 1020 msedge.exe 84 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85 PID 1020 wrote to memory of 4688 1020 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e268829cd357453bd5f40f644ba7d7ff.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff054246f8,0x7fff05424708,0x7fff054247182⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9628905124917502112,2219479645940174821,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
6KB
MD536230e9f606961e2e9a40f0d762c5cdc
SHA1dc69de1a6f587b53aec0a9b41fee07fd0b77ba67
SHA2563f1101fb589738530fdcf119a454f3f5cc815183f4e41f7e84e7c63c2422aeb0
SHA5124e4dabc25d2a2e13a6e0073dda64d0694314cd5b235b166445e08e5249a38eb99fb2d0d19ec6957035c9afed8e8f4010a321c31af142d1e3197753426b8a56bb
-
Filesize
5KB
MD53c9904fd83eaf33ab2d3a327f38e537e
SHA1117373ae52b55d645d25107c0e415bdd779be852
SHA25660cc43ca10f3959496bfa81b63cb1144aa647111973da81e47e6b639bdd70b83
SHA51283c93525d0e90ab9f33f3ee645deb25fefd90c1953f0ca72df558d3c480ee2041840e8bf66235e5434d566817059172ade60b5ec1728d2cec98c895fa19ccb26
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dfbb06a4d92fb0b0463a51022b0e43d0
SHA1e1198779a73ddabd83e35ae4fdf0a644e9d95161
SHA256fdda5c388f245d297e5483c5769d954392a9de8f1699c25c182228eed5b64fa3
SHA5128d95be8978860bf336d5a6914b24a37a9cadc8f567a81b7ce5c6b7f8421bbc2d639b71895006e1bc3029045775910b00dc4cf1c9998b163f1feac6273f8999d0