Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2c94c94adb4c6bc59a772614a3b8797.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2c94c94adb4c6bc59a772614a3b8797.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2c94c94adb4c6bc59a772614a3b8797.html
-
Size
44KB
-
MD5
e2c94c94adb4c6bc59a772614a3b8797
-
SHA1
416ca39cd9e9af8844d731ef952b4a84ce1a3baf
-
SHA256
4eebd66a0428e29a816194dbf2b3712667240c84357ea15529c21864863b9166
-
SHA512
d2333a68da5975fe269640b12810fce8a019ebd1275cebf2e8898e53c1fc37c05f3edb0bb565c0ff5d5144826e34431f466154d5a1dff5ef1cf026db4e82df1d
-
SSDEEP
768:Zcd9QZBC7mOdMgppC5I9nC474DAjR6QPd:gQZBCCOdN0IxCU4DbQPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2932 msedge.exe 2932 msedge.exe 4904 identity_helper.exe 4904 identity_helper.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1968 2932 msedge.exe 83 PID 2932 wrote to memory of 1968 2932 msedge.exe 83 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 4468 2932 msedge.exe 84 PID 2932 wrote to memory of 2144 2932 msedge.exe 85 PID 2932 wrote to memory of 2144 2932 msedge.exe 85 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86 PID 2932 wrote to memory of 2132 2932 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2c94c94adb4c6bc59a772614a3b8797.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7eb846f8,0x7ffd7eb84708,0x7ffd7eb847182⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6512 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11698368813637750748,13640222833494683974,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD532a441c9f513ee703fb32bf5e18428c8
SHA1e84d63585e2ebda5408dcae2a3a6bfb8eaba82ba
SHA2569a275f9e1c535b7e0d8dae4219660e9e5189bbf66c8b9a791ab6a005930b2ac4
SHA512435c2e0e57f10cd7875c0d6b416de53c222ff07578f16ce84bc7de469391c324092b2ee87fac9f4bc3ae67276211fa1cc3e826d9e688f4af3c59bf41cf1dffb1
-
Filesize
1KB
MD55cee2602d55054f98a1bb4011e0e4c77
SHA1e1fb6caac3b5e44ab549d6cd1053ce91dc1fbe3e
SHA25628c60617ff07826d5cafba9504b12d9f9350b71e494ae61bcd7f7408307453dd
SHA512cc0e6bba8d9ca101f3025a37d6d9f636761e2d821041056b39791271a0acc94aca06fc27b12e910d2f5a87af18d73644746eeb8eab8998ed8280b6a61e549a28
-
Filesize
6KB
MD5ea30b8819ee2c6b0812ddbf38d20f8b9
SHA16bae7cf9d6a6cdf503493fbb4c613f2e100433c1
SHA256ff8eecf4afcfb6bf015b3f4969164abc605b2b69c08c0890fbb923d65c072056
SHA5120d1732080e53031610d75b9594329fe07a0d6e4f5aacfcbff4a971a8f2f68d090b29ba53a80ac1c0941ceca88be170d06f41cf2cd6ddb12e20f7b427848e8ca0
-
Filesize
5KB
MD57bf6c6910c88781a0b525a28d55c98a2
SHA18d72bce81d754f6ecad6390be337a039e1cd8879
SHA256f9c7dc5c7bdb54bb4dc2ef8e2ca7e5b41b586e4a642de1b3669ab02cc2252add
SHA512d563b8b0bff719fcf0571067bdd75c2c690bd03693072341abfbecff01ab6cac593e5fc3819563354ec85e79dc15e91dc6c3c652d9a81fd331e0b69a26659994
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD572723acf15ac1917c5d957b658d7b912
SHA19a8d753a3c11ad58188f9007a04f4feef507f505
SHA2566abbe7a267af3df94d2dfd2aa190ac45f563e7220bf59126399008b28d9e77eb
SHA512db2089377b4cb536a0c3821d0556e1e7c511dfedf61132ae70744893df0bf20fcf38d1b6d17129dc7d3dc3882d5439445d7822c315209b8d0ec769086cf01590