Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 10:03
Behavioral task
behavioral1
Sample
JaffaCakes118_618ae5b3a6de470af560061f04b69c21.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_618ae5b3a6de470af560061f04b69c21.html
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_618ae5b3a6de470af560061f04b69c21.html
-
Size
112KB
-
MD5
618ae5b3a6de470af560061f04b69c21
-
SHA1
be6a2cd586199bda3a79d9077ce7af29e767777a
-
SHA256
40430292e7557d6b1f5e15537a522db75e412ed152eae8e7c224bc82d34f4782
-
SHA512
69f4c039188887de21f25edde0c0c107f64294af4aa40b9bb42c992776e68e31090f318d0dbc0564424a082fe575f9f536732a59b0227ace3c1ef2a1c57b75a6
-
SSDEEP
3072:CwClodVhmvqYodVh1tTUtRcnByu65CgjTldi6NqoDj/C6tMZOc0d:CuFUtRcnByu65CgjTldi6NqEj7j
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 4440 msedge.exe 4440 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 1552 4440 msedge.exe 82 PID 4440 wrote to memory of 1552 4440 msedge.exe 82 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 548 4440 msedge.exe 83 PID 4440 wrote to memory of 1660 4440 msedge.exe 84 PID 4440 wrote to memory of 1660 4440 msedge.exe 84 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85 PID 4440 wrote to memory of 4488 4440 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_618ae5b3a6de470af560061f04b69c21.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbc8746f8,0x7ffcbc874708,0x7ffcbc8747182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,12774376986345122887,16384998888780471126,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,12774376986345122887,16384998888780471126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,12774376986345122887,16384998888780471126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12774376986345122887,16384998888780471126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12774376986345122887,16384998888780471126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12774376986345122887,16384998888780471126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12774376986345122887,16384998888780471126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,12774376986345122887,16384998888780471126,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b9013b8bea41aa2c8fa7f4763168069e
SHA1349be86bde65cc0c3a15b2b21b6eaf2db452e92d
SHA2566245436fe808740cde15c227fcda465a37a52f17f3642a71f0abbc466ce5b466
SHA512d23bc18adb6acf9eb36fea85becb7b1a004bed034ef443acc3d442d1364f2ffa17f57e8eb6eeb1702dc459c5c16763b4e72249e6a326c9c36800d3f395fdd326
-
Filesize
152B
MD5908f9c2c703e0a6f81afb07a882b3e30
SHA153ed94a3145691e806e7dd8c160f5b459a2d16ef
SHA2564436bec398522c5119d3a7b9c41356048c19d9c476246c76d7a4c1ee28160b52
SHA5127af7116a91c8e3dfc23db8a78d7aff9a8df8e3b67df7f4ee66f9380dba4d1e66d980afaefc5dc2d9034ab5c0b7c6934400feb32645373f3ff4f8816414ae6ff4
-
Filesize
1KB
MD546d0b3ee30c38df6bfb8cd54f00a69b1
SHA15af5adbea9d17d6326fd617a35d7a5f8cdd785b0
SHA2562445415d87da67822621f51b9049b9f071af43bd1ae849f8388decf09e3b9d7b
SHA51252fbf39f95bb4cdd1f963fead8259572355e589dc046e05af1c9f5811dfafb831bebbd73c9d58e540418079e48f7536e90d6a19c08c17b112e0da3465f05f677
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1016B
MD5a70fd8f7e553b946a3d9f85290e31966
SHA13ac128b27f5d6e7848849ed8069d65d94ad1efdf
SHA2565a28b652120401fcd31f1f03bec42b3b78058b296c50f9676e4bac699eb6cd97
SHA5123604d06269e10618f11fd547588fbb71b2b47091ff1b89a1b40bd113b9ed4a2cf12034e24cb04c34be3b04e408eda2582b953e9e9a6fe864eadde17825f4005a
-
Filesize
6KB
MD5df2c68068dec471e5ceff9bfc17c3425
SHA10a17ae70726739a7c52a87793621719cf08c20cf
SHA256739c109b46b3ca31ef81006660e3671ed2468bf2b48aa90e2320045d4834e7ce
SHA51257e9b9e9d77f2b5c4aaa024d8e93e7bd35d99b8534efd55b3044c37a29c8dfdd912e1f91b5b6c3be2d0b9077c230beb9595d0057e2b75ec883df10b82cc4b465
-
Filesize
7KB
MD540c2e14eaeacf8b25558e17ca2596331
SHA1f2ca475fe881459b16021e54700c1d0490dcbba9
SHA256cc51fa2b46ef51cbe99acee6ec9cf89ab8dd1823934e40db6c0defbe99c28cfa
SHA512252edbdf76d28607b4a38558ae4aa761678e04a21ec6a10ab2b662bc3a23609edb1e1d3ab0f7905b3aad7010f3eac7e779bf6898276e31d771ae50cb06527175
-
Filesize
7KB
MD531c1b23c68f849f55655dad4fb0dc44b
SHA1873546d246430da4722f596d3a4248ceff1f6a61
SHA2561f7306998cf8637870f943ffc585a3791a791458da16daa2bfc94e9fa4dbd52c
SHA512ac94f04ff1a2b4eb49b76bdd052c1efe439e7cbdb82ba2166d357b515d793177543c2c16cb4995a43673a90f7d13ee90bda3bdc576e93eb8db25f63aded5516a
-
Filesize
10KB
MD5652de00c387be98355ce26e5f64253da
SHA14c91b62b483bc56f1c0c276b90ec54468d9c1d9f
SHA2569980315481f6decbaf71e3c834fb0ff64f2e749644bf1c67bcec1663e6d7dc1e
SHA512c71b8b5dff9eea7ad615cbf0053e7df0a9b0462c69176a208cb78edf4dff299b2a0329ffc98d5a73ef580a42e1443c3cdf04b4ce58093364ed7774daa92407a7