Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 05:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_025bb9db56e4f5e5799c2bdf8f087e3a.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_025bb9db56e4f5e5799c2bdf8f087e3a.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_025bb9db56e4f5e5799c2bdf8f087e3a.html
-
Size
127KB
-
MD5
025bb9db56e4f5e5799c2bdf8f087e3a
-
SHA1
f1ccdf24a858fd008e20169edd56cce5e851c0cf
-
SHA256
0ef4f44ddc6d9fdb6ca34c6d7ca9a0390038615853a725032c2f8bc9e5b876e3
-
SHA512
06371e429a5f1c4806ca0cfdc413191d7fc0148e04ea0685cd552ec4c4cb92ff86ddd887d7729ecf98e9e7712196442f7edfad087132ffbdd5b94cd9012c753d
-
SSDEEP
3072:P90KfOd+BkflSoZFodRh92SpPE4y/v+BtnM:l0KfOUBkflSoQM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 452 msedge.exe 452 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 452 msedge.exe 452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 452 wrote to memory of 3284 452 msedge.exe 82 PID 452 wrote to memory of 3284 452 msedge.exe 82 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 2640 452 msedge.exe 83 PID 452 wrote to memory of 3556 452 msedge.exe 84 PID 452 wrote to memory of 3556 452 msedge.exe 84 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85 PID 452 wrote to memory of 2252 452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_025bb9db56e4f5e5799c2bdf8f087e3a.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe93e646f8,0x7ffe93e64708,0x7ffe93e647182⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,436756743714025585,12142928224750624369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,436756743714025585,12142928224750624369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,436756743714025585,12142928224750624369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,436756743714025585,12142928224750624369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,436756743714025585,12142928224750624369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,436756743714025585,12142928224750624369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
912B
MD568edb97ad44a6c7139d95321ed0e8219
SHA1e6df473eade5731546672e2f60c2c36c5ad18731
SHA256831b2c65737b0b14e72077c0c33b93048bb38448541604051b572114ec619bb7
SHA512a3dd0ad6d2608eecf8f35fc6e51d67c2b33de6e10ab67d275fca5d0c49ed5da00165667cec3bd5ce13c080471d1e87f5486541a8133ca402ab1b8a067c41bb81
-
Filesize
5KB
MD54006c29141fc8db170d28764016bfa95
SHA1bdbec8173b3d4986ca968a1764118fc769e02eda
SHA256da8b3c3fe9a103f4610f263fad4c64b5b643f9cab01372641f4f17a375dfb783
SHA5121306c2acaaab960a4752241d3429f3d0f5ca1b5632ec1cb0cabc268fb59991ffce84846803fb657fe151483289aeb902955d4c87506459381d8f1257edb40569
-
Filesize
6KB
MD5292338ad4947374b6e7263c15608eb36
SHA1d94c0d8fed2f9084c03bfd11f34216bd35889a25
SHA2568c37e2e3fb538c89609e9a11879e44e722fe0ac13ba45bb693eec115f8c332bd
SHA51291157c3590535cfdd3ba792432d285b8dfb0f4cb22ae6299bc87ae7483f0c11196ab73f878b13f0278174f02f8ec0adf3d1b10a2f506070cb8e17d471e14d207
-
Filesize
10KB
MD51d13bfe621e1efe8a51a05cbc5e01f7e
SHA1a77799f21c41e88e71db4af1c455f0608b03640c
SHA256bb8f54e7bb0257a12d9609ebde8928e9f9df555564e1db7af82dc115086088fa
SHA5129606d0f1502b6870546de1533a7647fc3066b348b4afa58af1e057acf9780b14cfbd2cea4f4a0b3458191b143bd0497ae8515f50ff573e98ff69c9d394802e72