Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2c44c52204c9f9dfcadab32a7a3267c.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2c44c52204c9f9dfcadab32a7a3267c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2c44c52204c9f9dfcadab32a7a3267c.html
-
Size
63KB
-
MD5
e2c44c52204c9f9dfcadab32a7a3267c
-
SHA1
4cd8f5c0764a4be05351246432b70d0e83c93785
-
SHA256
9c1eeabd0b8284cd2489421627fffd637494e8d6841c7ba0ebd4550b7890ffac
-
SHA512
ee582a70ffeb454fa8d39a4fafa3db8bd1132030a1d566b42e7e08ecaa90d531677ca1126456b000708c68625abf164a417814f5f90fa8aa36b8d4182a5a11ef
-
SSDEEP
1536:SyP01ZLWa3yIxRRIcJLPFjrrfi1ZXOF7pND+/7FbLKNm2JnInKLvYBR:S5cZR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 3680 msedge.exe 3680 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4824 3680 msedge.exe 83 PID 3680 wrote to memory of 4824 3680 msedge.exe 83 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 4144 3680 msedge.exe 84 PID 3680 wrote to memory of 2300 3680 msedge.exe 85 PID 3680 wrote to memory of 2300 3680 msedge.exe 85 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86 PID 3680 wrote to memory of 1280 3680 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2c44c52204c9f9dfcadab32a7a3267c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe56146f8,0x7fffe5614708,0x7fffe56147182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8226974050070053871,4811563452010475691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,8226974050070053871,4811563452010475691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,8226974050070053871,4811563452010475691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8226974050070053871,4811563452010475691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8226974050070053871,4811563452010475691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8226974050070053871,4811563452010475691,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
393B
MD56b0aae2660557de2885ff55f1f7c11c6
SHA11b43d7efc9e7a8b103ea5820e1433ac133ac5fbb
SHA2561d80386f80f3bfdcd5dace51a91d43af9b944188ad47754be7d74f3fe8d64129
SHA5123012c4c7f9d567473c433c87c58ba2fea2a5d1216f3230018bb447be18213b630cd9c17fd7de578fa70067c4aed8cfea7573e4d9ea7d7ab4b954e7a94581969f
-
Filesize
6KB
MD5ac27700fc05a86f8fce09b0916501c39
SHA139f91de51ba442f78fe156df72dcd49cadd8f668
SHA2562727697dc01c16975645a073ebc6f5e8d9022e7ea146092957e96780486abaa2
SHA512ff995ac9f487b423422f5071807149645817427d9cd48f7b6aa11302f788e90f5659b6e46790d3ef9450328bd0ca8f29dddc041bc38a99194622dd4ed7706fb6
-
Filesize
5KB
MD59ea3edbb97f19daf5124d67637af4037
SHA187e0a6dd7bb1b2683da5309c2d60684b33ec3cad
SHA256d1e77fae96b3900c0bb145f12d2f3e003ab72938452b134d4716c38aa236b7cc
SHA512d089594cd0358c440f72239d850837ed102c4372aa9cb837385cd62f01a2ecc8d1fdc5f9ede52dccdab5bbdd7b99385e027d8de105e07f8dca82295cffb136b9
-
Filesize
10KB
MD558649ddd3655a63f3bffacc3c6f276c7
SHA14dff91497aa4c4808d94b93bcc6e3850cb836477
SHA256ce27bb8a9e5c20f506c215258a5d98682e3611cfea9b71f38e194f87f81eb9f7
SHA512d21088a84730ac2152e5537c4b4e2ebc4e684da88f6fb6eeec2605c9caa0d1306e0197088417e92d1abcedb8fe42dc78a02a519c006d6dddea23303123e69ff8