Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 13:00
Behavioral task
behavioral1
Sample
JaffaCakes118_1777a6e3f7ca73a805040a42330f251c.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1777a6e3f7ca73a805040a42330f251c.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_1777a6e3f7ca73a805040a42330f251c.html
-
Size
91KB
-
MD5
1777a6e3f7ca73a805040a42330f251c
-
SHA1
1f397e2f2ba0be9e8e4dcd807018ad91586dfd02
-
SHA256
2fc0ddce36bf352afe7b91eb0f97eb5849e19ba8d48f783335b8b6d1ee346a4d
-
SHA512
2da4200bbf07b708547865cf3b143157f1fc95d54ca684c4c7da946fa3909eba69571b8e0d4d8614373d205d07e377171aa85c3659b26befe58d2d2029f8b932
-
SSDEEP
1536:CJfx8mRk/lodoh2vXLodohVthZBbMJ1uZuvexkhJC6tMX3cfd:C1Elodoh2vXLodohVthLb5uTC6tMX3cV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2468 msedge.exe 2468 msedge.exe 4804 msedge.exe 4804 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1440 4804 msedge.exe 84 PID 4804 wrote to memory of 1440 4804 msedge.exe 84 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 3840 4804 msedge.exe 85 PID 4804 wrote to memory of 2468 4804 msedge.exe 86 PID 4804 wrote to memory of 2468 4804 msedge.exe 86 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87 PID 4804 wrote to memory of 2612 4804 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1777a6e3f7ca73a805040a42330f251c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff92db846f8,0x7ff92db84708,0x7ff92db847182⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,481433307600739310,8579388688158612788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,481433307600739310,8579388688158612788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,481433307600739310,8579388688158612788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,481433307600739310,8579388688158612788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,481433307600739310,8579388688158612788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,481433307600739310,8579388688158612788,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
973B
MD562c422a9bcbc174513f771594bee3a56
SHA1d8f23aeeb138cf91a4e8040b52a2bfb40a94ffca
SHA256175bafe8ed0dcfdef50b6f234bb8e97f3a67f5f6476e5494efa90399290a1b2c
SHA512dba865d3192970fa10872272c78e692b09818314a74a12b447dd941b23b6598d6d17a7be9932b9bcdd238f0bc5af126dbf1ef0721f8733ffe748d0afc9305dca
-
Filesize
942B
MD5678b014986c27ffb2a4cdb9c03072215
SHA126552e79c0044091b7ae9da67f74219b7118f5e1
SHA256b0cd568a8214bd0381ea3c7ac3871893f4a39e18057ef3549801949514d7faff
SHA5124378c2e5203a0b8f8f8ef590f06678dc6a3efbad120d2ab10947a0910c89eacfd6da48822ce671c5fb02adc67925be9b48497c353531803ad9c21a987cbf6a4a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5e5ee9067b80c07b699184786f3505960
SHA135535b68e23d51f72339bb3f271b3a850b926c38
SHA25655e7f9ad8dff25d1677156d9aebe49c5730f213fa23dd6a00d543920ade5b50c
SHA512db41e4a09c8ab4f229ac09df1b99c8a55217e821d5cdd72c138db1ce6415460e2ee65517a80befa8e74194887db90406d0735060f613a006908641c04ebf73da
-
Filesize
7KB
MD5491b1c72930b743f29de38862335cab6
SHA1986b2da24ea9de19b4be97b90ef737ecedac9985
SHA2561e965ec49e15bde74074967829a3aadb06f190345bdb259ae97ca83abaffb31a
SHA5127334a5863025792e625919758d5ff7ec4231001dec2d4487a4ca826bf1e7ca45cff9c2ced59039901fc70426498b2cc40393e16c7d736886817d9250ae6a61fe
-
Filesize
6KB
MD52b976f496439062345eae588123d12fd
SHA1778c2d3ba24d74242d2acf7e537cc85e36e1edf9
SHA2569faaadd833d2a4fee8845d5aa185a6d0a602665771ef5f329f796957475e518c
SHA512f15c7850a050f41c64714af41f51ec505d9f6d095049f9a9f5499cb8382fb56cc4fcc0b8bdc5fd46bbe67edfabf7636daf92fb5468f14669d338296ec1768e89
-
Filesize
10KB
MD58cfe85072044f89f59ff1e8aa49166b1
SHA137259bd24f587878d57819ca08e7733ab004ecae
SHA256a46d43308d63b41a6d7a7d5b83048d915b9ee1677209d73e5a12502e46c649d4
SHA51217144269c69d0d00d1ab72e5184d8aa4ceb30d8b3cc216b83c0ba1b3ae5e99467972e133a9be431ccb67db4f4d12eb4973b3d18e8769ad6c405debdd9242f63f