Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 21:35
Behavioral task
behavioral1
Sample
JaffaCakes118_1b4829e2a7bb00bfc7394ecf61565ce9.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1b4829e2a7bb00bfc7394ecf61565ce9.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1b4829e2a7bb00bfc7394ecf61565ce9.html
-
Size
154KB
-
MD5
1b4829e2a7bb00bfc7394ecf61565ce9
-
SHA1
634ecf276ed4ac75d2647798c8a9769411797782
-
SHA256
db9266293c19a7f2917b08dcbb20e61fcb7962b630e45fab590b2e62a7cc0702
-
SHA512
7cae679e3b721d62a5071cdff79289c806f0502b94c1f967cfdea68eee1509d90d3fe559e57d47734c927b4db49ac260d053e346374557641b5562344fb10b77
-
SSDEEP
768:2Mk1ATx+Bw24Tp7VD6quI8YiWWcVI0Hoy57EUJ3uCmWDrODQPydd7rxq0pa7XE6z:2IHD6q4cVvo1UJdcFpa7XHcDOatLlI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 548 msedge.exe 548 msedge.exe 536 msedge.exe 536 msedge.exe 1792 identity_helper.exe 1792 identity_helper.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 2440 536 msedge.exe 84 PID 536 wrote to memory of 2440 536 msedge.exe 84 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 3840 536 msedge.exe 85 PID 536 wrote to memory of 548 536 msedge.exe 86 PID 536 wrote to memory of 548 536 msedge.exe 86 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87 PID 536 wrote to memory of 4748 536 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1b4829e2a7bb00bfc7394ecf61565ce9.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92db846f8,0x7ff92db84708,0x7ff92db847182⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1688 /prefetch:82⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1372,17087873119736887602,2095536497682838121,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
395B
MD5cf6aababdcea94f6e4ddf2936d1280a0
SHA18f09b3719f9e41046b2010e58cf87e65cc5d4e2c
SHA256850fef423214dd238ad20c70f80b8e216932a5eb701527b7e62e3879f18a3d39
SHA5126206967f286971e6d5f091377e6bdc8f3f8da3606e6576bcf6ec79fc838b23391591bb24749c8f63ba3e1a36207f6cf09e061f54af92ae54141728ae04401d53
-
Filesize
5KB
MD5c9535dd684ffbd258179aeea8ba7cde7
SHA1c3e8be908b0d7cdcaf05cb0b06dc37b0cace79e3
SHA256100f2f094d8e3c09cb50d02fd086017e57e716b9f22dbc864ff43c3c01801c26
SHA512c7e8f52a59f83417904c1247703d1d6d1075142ea147298afc7fcbf531dab713772b0029b2d069c9571280347305183cf48cea32686634f1df1e0f273984dd15
-
Filesize
6KB
MD545d0530c507c8e2d8437f6147d9841c4
SHA1a2f335e5d83bc473d8358ae16a88f6c9921ba4dc
SHA256357d9035b7dab223a56c0472fe87fa55a3e89407c0db8b165d44feadf244d9dd
SHA512d866ccab272206396915419b61b20c43508193f2a6070724d8c4c007f0d8258b616ed194a17f69395a3ff90e57849cc49663e81965cc8d0b2b20c714bf84955f
-
Filesize
6KB
MD5ca1f8cc3c1bc51d5fcba7559db5aa2b2
SHA14382e4de2d8b4038facfd458883dcc7933463e11
SHA256fde32353ee21c49562ae7340f339f0637e90653f8a29852b419d4566874fb82b
SHA512e0ac38125d8b887ea69fe548ace8068c7d8ddae15bcbd73bb641a0c89dbaafae5b519e3ef03cc270558a617989f1993b86df284cb0939751de601d1e86330bcd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD55d0bed108c285b890e97d2712b8cce49
SHA1c22dfc00cbcff43979b17bf0579589bcd0a4f79d
SHA256186e508981ea834abcf2a3843063924ef3e68b793b58e95db681f76673c8007d
SHA51228b79379c0d09982324f925a31628eb776b69ab8d372d9db23abb1fcad18269ff63527f0c3e608ff1890ab31d7dd1992855a54f9e37195dd1cd30a8c269c9b42