Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2623b7a15cde4832c60fad3fd369479.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2623b7a15cde4832c60fad3fd369479.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2623b7a15cde4832c60fad3fd369479.html
-
Size
53KB
-
MD5
e2623b7a15cde4832c60fad3fd369479
-
SHA1
4c93e5c0a90e551b506ae2c960fcad773c83dd9d
-
SHA256
a9f29efb6ca2ef488bd564a245b627a82ead9849ca311b9078c8f0b1d43cd362
-
SHA512
cabbaeed38bdd99b39b3b336ab8ff282fa8d60ed85e9cd74cb277a8536a6e8d40fe2be77cf2ca186c27a9df2d2abf0bb91c8fbeea40e7cdc452567a413225db6
-
SSDEEP
1536:CkgUiIakTqGivi+PyUxrunlYG63Nj+q5Vy0R0w2AzTICbb8oL/t9M/dNwIUTDmDP:CkgUiIakTqGivi+PyUxrunlYG63Nj+qQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 720 msedge.exe 720 msedge.exe 3680 msedge.exe 3680 msedge.exe 2172 identity_helper.exe 2172 identity_helper.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe 1428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4696 3680 msedge.exe 84 PID 3680 wrote to memory of 4696 3680 msedge.exe 84 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 1700 3680 msedge.exe 85 PID 3680 wrote to memory of 720 3680 msedge.exe 86 PID 3680 wrote to memory of 720 3680 msedge.exe 86 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87 PID 3680 wrote to memory of 2620 3680 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2623b7a15cde4832c60fad3fd369479.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa048146f8,0x7ffa04814708,0x7ffa048147182⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1072015611199982467,16103753793366864144,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
6KB
MD533f92543e4b56a8397957e79526ee4ed
SHA1b79004a3190b772663f636f314f21c125d71d9e1
SHA25634e01f8b11b5665d475221c34849e4636686756edb913c780262aef46225131b
SHA51272cff06f335f4e562713341e6bbf685d3b032b97b02ddf44386c69cd5c20bfbd67f601102a7359d4efc92218696ddcbe54bba13348afa63f864a3b460c2a7efd
-
Filesize
5KB
MD5979a17dd8282221b0f64de3f0158db2d
SHA19901770cf08eb24198cb4e9be166d2ad8c95800b
SHA256cd509b92c127df54ca6ce6eae7380b1819154ae0731fa522932ff9ae3c014b06
SHA512ddd5fb1aaf08b385653cd7bfdc5f1eab27d7bc4eb9fa7406ee905a774b70fa8d3324189611e66b32a63ec4725c3cee7e10c34b1029d2d7fb9cdab6af5f796d46
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b7c933f622c248de25a6ad0d17dc7ccd
SHA1b1fb38e6ab4c8da09a7fc1a20f1febe5b6f8dd09
SHA2568c8c22f3b26ccda9071f5409988225a83cef93dfa0479175c9a84b2f8f091d0a
SHA512fe7052fbfb8b03ce6a0beb6cdd6c84c44907c3576c22e9ad99ea4b972be8213dc1e9b7e14f134b556e4580b6598390a91f4ef9bbff8e2ec65931684a74d6f7e4