Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 12:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7cf0caefd2eab115a914319a6b781a5e.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7cf0caefd2eab115a914319a6b781a5e.html
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_7cf0caefd2eab115a914319a6b781a5e.html
-
Size
122KB
-
MD5
7cf0caefd2eab115a914319a6b781a5e
-
SHA1
d60c95b2fbcdc4fd97962444d7fd7adf25b74d5e
-
SHA256
0d565a1283faf38dc4394f1008cf59237869de1c1dec5e8a9ac409290051079c
-
SHA512
3c9b736e22ccdac3cbe2c61ce67f960dd0274cf84054b7fc48b261a7f6d8e8482eff0bfe8769a982f81da279dcd7638e9483b1c58369ba36163da71fa628550d
-
SSDEEP
1536:bWJEEJXF8aJ9CjanDD9BVZfkjnJKlf5wrw+io:bUJXaaJ9CjanfVZfcN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3644 msedge.exe 3644 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 3500 3644 msedge.exe 83 PID 3644 wrote to memory of 3500 3644 msedge.exe 83 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 4876 3644 msedge.exe 84 PID 3644 wrote to memory of 3660 3644 msedge.exe 85 PID 3644 wrote to memory of 3660 3644 msedge.exe 85 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86 PID 3644 wrote to memory of 4116 3644 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7cf0caefd2eab115a914319a6b781a5e.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf5ac46f8,0x7ffaf5ac4708,0x7ffaf5ac47182⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13218575911503369250,4919526594770762491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13218575911503369250,4919526594770762491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13218575911503369250,4919526594770762491,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13218575911503369250,4919526594770762491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13218575911503369250,4919526594770762491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13218575911503369250,4919526594770762491,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50504c0d0b9c007a767de8a404f2ec484
SHA173b1066ce283079341bc94a3e5c65535f0523145
SHA2563469f4679beea250ce59f3fa4721e48f81587735f44e0fa2b70638b78dbf8a2d
SHA512c6c0c6edbaab3b92832c4140916e99ca6725b79e5d3a43ad59ebd94a567458ef79923e2236b43344ecb6fd75442d0c7779b024edbd1bf9035a2a86ba7e5ce606
-
Filesize
152B
MD550236cd957789ed0d1b6564c7f0ecfae
SHA14c9e4dac57ab9ffb5bc55154d6ff89f1e6c1d5f4
SHA2565820467c07d06249a1462b7c9deeb0801a8a6475ea19637397b9bbbc95f90fcd
SHA5121cbf4be5224fecf811bf81361d6d282810de016194b17e2002d510287d384048272215b813838912eebcdddb1f657ade0aa3c122871c9d636b6a8fa8e74535d3
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD53c921ea4d6aa24fc6539c2da606507f7
SHA1fb3fbfa2de3a9c9334d5a503581f93f11939e297
SHA256a36bc6e5c6b264c985e13f50690f35093a982e59acec41f096ec4e680fb93d8f
SHA5127565cddf9b0d91bcb47f906a4171e83e4f6b845dd5056aa19e0366a0a6b96d0ec1f257b9d3d05b65df8b42c4eaf9beaaae359d7f1e380896759d4249c6a25def
-
Filesize
6KB
MD57fce91f80566633251fc768d2577ebd4
SHA163c74b399dc55d91c54e6b5d0f5151c97a757faf
SHA2561295c961fac0937430c234b783a82922ae5ba7f0ca94bc83b3b2f1d2aa72e13f
SHA512445bd36639db8d6bb52340e933b5137273a7ea90ed7fa661962aa071ea43ae65646d26939fa64dc9443e0c81e9da213eff54136ccef4f69bc51a4acd85baa8fc
-
Filesize
7KB
MD5c2a17cc535c85c3f86f4e12161172969
SHA1ca70760ed444a1cedff3c922ddf8d242dbbf5c78
SHA256165ea5bc536e58cf9314b4e25c318cfbfc146f171f2f9a7bd0ba6a85f2701e77
SHA5125a082f98c59b839b91a30b9d9a8895007adc499cb8e8faff0f69fa4ff249b884203147212875a562588f7e54e7829ef2b6fa117115bbfc4ff5ba3ebd8f961a31
-
Filesize
10KB
MD51287a30f13c67c23e6af9e6db5858286
SHA1b53c5077b231ddb377700a73811afab03a584d2f
SHA2569b3cbaa300ecd1d33e0f295e04c6647df34a8d5a86e13042a074aa97e10f5538
SHA512004cace0a2585eb696b6056fa5277c787284ead214d812731cbd8e042523df028fe8d481d2d64a5351fc30c260d65d69d114a6957de2266268060171c1044b20