Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 02:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5dee4a630f3c939f7aa71f76cfaf4d35.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5dee4a630f3c939f7aa71f76cfaf4d35.html
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_5dee4a630f3c939f7aa71f76cfaf4d35.html
-
Size
373KB
-
MD5
5dee4a630f3c939f7aa71f76cfaf4d35
-
SHA1
4fe72b5a26abadf8e33beefa62b27d5f209930e5
-
SHA256
92d91749fe6df197697acc7d42c8f3d73fda8afe5cbb724bf69f262ffafc52cb
-
SHA512
fa235f1cf0b4c6486d288929edaa37bee4a5d8cfb8fafed01b366326089aecb33cdce53fdd6b10bea0d11154f56b9c23500e04715d5ff16bfb5e593872adac4e
-
SSDEEP
3072:VETUKfzUTvuH8ophMbyRZp2vERII9Bz6QLepldI4dQNuK/AmvRW:ZKQaH8oeyBs6I8Bz76p3dQNvRZW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe 928 msedge.exe 928 msedge.exe 1728 identity_helper.exe 1728 identity_helper.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 928 wrote to memory of 1940 928 msedge.exe 81 PID 928 wrote to memory of 1940 928 msedge.exe 81 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 1300 928 msedge.exe 83 PID 928 wrote to memory of 2612 928 msedge.exe 84 PID 928 wrote to memory of 2612 928 msedge.exe 84 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85 PID 928 wrote to memory of 2196 928 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dee4a630f3c939f7aa71f76cfaf4d35.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5e6246f8,0x7ffa5e624708,0x7ffa5e6247182⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4132781315091773263,13889587068731668568,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59bfb45e464f029b27cd825568bc06765
SHA1a4962b4fd45004732f071e16977522709ab0ce60
SHA256ceb8f1b0aaa1ba575c3704e73fd77edf932d68c8be902b33f1ba3b1d130cd139
SHA512f87cce8bb5489b56027f5a285b948b639a1c7b0f213a111f057235177e5bffc537627c82586736704e398a0185cf2ad8ba8cdee788531fb753a2d08f16e906c7
-
Filesize
152B
MD5ae2a8f2ebc841509f7b978edf590d3cd
SHA191358152e27c0165334913228005540756c35bd3
SHA256631550765e3db02be0709748c0634a2cfdab711cea94f5890854d0c1dfbcb214
SHA512e52180dd175f1e6ff72d76400085869387cd70da33919de219a04dc26871e8421e93b22e7c59125c19c6ee54a8a8f742d796ac68ea9077c9dab5f03b80967d11
-
Filesize
6KB
MD59bbc012a527cf6fa44428c8a1f907c58
SHA16990d71472b39d9dbb80aef5206adb087637e62c
SHA256ef907616e106171938c0a592245d0acdcd566d95db2ac11e7c5f86fe2923b08b
SHA5121a6f8cc95f1a96111d3bcbcf2b782a485374af9a4f6a30957cced02a4ccebd56decb349294089dcae2df7c70e2539a72d4c19b7f2d5a9006123c632618eb0d79
-
Filesize
6KB
MD5c37e6237e90917ae5ee3aeb61603302e
SHA11ad48dcae218c8a2930efbe98a6cbf59fab07473
SHA25609129c6d7ba15372ec4604eda9004a6810ced39ee0bfe5566a446819b391ff42
SHA512febe87f3b846d93ad28edd18dfa18669a31e1a99e92831eef56ddff62fa8dc08380712b4efa386f51608ec175a1a4c7e1585f6f0845af725d2d2d25f50eacbdc
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD55129bb8f4c36d2a0b95905f985f01632
SHA18a6c9b06dd017db6e64df00476fff374cf0153e5
SHA256107e01d75b255c0632218d12a18210406e4b2d1e002c9cd203904c1adab2f51e
SHA512a40120e9b449edc7808af56fb43892066fe6f8916da6486756e83ff14e99d7ef8a74f4671ba9722804c04e25c9b36f4f0718e48d34858637f641d3cc57ef4d78