Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e269e7edf7c732899d547c644e3b0c3a.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e269e7edf7c732899d547c644e3b0c3a.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e269e7edf7c732899d547c644e3b0c3a.html
-
Size
10KB
-
MD5
e269e7edf7c732899d547c644e3b0c3a
-
SHA1
ec8972924517e9def999d51012d8b82c7eeb3556
-
SHA256
4b8fe989ad793d443de1a574b34387b6d981d41ee469d72d711979c3609ad7c8
-
SHA512
5bf06e353338c880f51be6c04d6a35aebe62310694083bb9527d15492e9acd05f8936cf3ee7d23e9af825f13d2a743249078c5642825c04f650408a3113ed672
-
SSDEEP
192:F7TRci3WNE/xdHQLrRbtUq5TbFaLYbJuQ+NedIILTVCTwNC1L4FqVNmno8EmTXGM:FdI0dEPUEbd3IKosrFqVNqum+ZmcmqiT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 2264 msedge.exe 2264 msedge.exe 5096 identity_helper.exe 5096 identity_helper.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe 2264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3860 2264 msedge.exe 83 PID 2264 wrote to memory of 3860 2264 msedge.exe 83 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 1940 2264 msedge.exe 84 PID 2264 wrote to memory of 3892 2264 msedge.exe 85 PID 2264 wrote to memory of 3892 2264 msedge.exe 85 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86 PID 2264 wrote to memory of 4932 2264 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e269e7edf7c732899d547c644e3b0c3a.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99bb046f8,0x7ff99bb04708,0x7ff99bb047182⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1400 /prefetch:22⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,5592497654676391727,12569725199731097783,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
5KB
MD530930539bb0a527693e560118e1a8fef
SHA11fe7eec2886f7b012c51002f97d53b4c6121332d
SHA2568b8d9966380d7f338b72bd0a1d43be5035580884b2a80e1a1327ca7d863b80fc
SHA51282aa6d1b763686bc497cd216f9f6d7741cbf56f75e10465930d7e8195fcb337ca15fb37e7ab88fa3911a4c2de9efefea607446b86ec36481fa61e9ab7f43a183
-
Filesize
6KB
MD5cf311ce1c0982191db320947c009adeb
SHA17e666366e9fa8258e54a557f8d07021bf0b4f958
SHA2567a0c58e8d9b7838284f65d7506e2e68d5778c3724c549f7a45cefd21cedf40b4
SHA5125c8eb6ba46baf37e1f6ab6104fa6a59f738128cf364b5f5e82551f161d893d3740f384371dcb715494a166d3f16cbe087cff8ee3cab0ef5f694f633fa0959d92
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD53b14a3c53ddbc2f436da60b4c9ad2f8d
SHA1f9efe5a2b62b81ae49d24af9d12ad82a58422658
SHA256cff675036facb429d567dd5b6ef8f2339e5b9aed1e0e257f5542787b9637027a
SHA51289a2abe4347d6d5f23433b3a42674e39f1e2a5b10fea4f7986d4da411569a898f11ff591b2542f9e04c2d567d38fd357e5339216b8f40121720323d6c0bc81fc