Overview
overview
7Static
static
3ff10a202db...18.exe
windows7-x64
7ff10a202db...18.exe
windows10-2004-x64
7$PLUGINSDI...s.html
windows7-x64
1$PLUGINSDI...s.html
windows10-2004-x64
1$PLUGINSDI...n.html
windows7-x64
1$PLUGINSDI...n.html
windows10-2004-x64
1$PLUGINSDI...l.html
windows7-x64
1$PLUGINSDI...l.html
windows10-2004-x64
1$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
1$PLUGINSDI...ss.dll
windows10-2004-x64
1$PLUGINSDI...r.html
windows7-x64
1$PLUGINSDI...r.html
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ui.dll
windows7-x64
3$PLUGINSDI...ui.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
ff10a202db671de2ab87ae64a09273a3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ff10a202db671de2ab87ae64a09273a3_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Components.html
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Components.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Confirmation.html
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Confirmation.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Final.html
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Final.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Progress.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Progress.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/Register.html
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/Register.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nswebgui.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nswebgui.dll
Resource
win10v2004-20240226-en
General
-
Target
$PLUGINSDIR/Components.html
-
Size
4KB
-
MD5
c75864671a2661896b99767ed8cf7ffd
-
SHA1
60195a1ec2ae1dbe68d9d933bb26c13bfa1aa7b5
-
SHA256
b49eb2664634c38747d18c9855238ba2f7c8c8777cedb3edf85ed409ded6311f
-
SHA512
c700432cd2f3813c4e767adc9483a6238ce1c3e87825f1d9bcf6c5f15db119a4ffbb5de26b579cdd4b891ff5850bbc53955d5f1d0ba7c9b507e9b7837b64574d
-
SSDEEP
96:z5YMe2Q6e2Qlxfcuy21JcePr5LgWY5/1AK6rMAxTOWf6Dr7Ya6k7yC0j9W8Tl:zjBx2jceFdY2pOWf6H7YDk7Oj9Wul
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1180 msedge.exe 1180 msedge.exe 1080 msedge.exe 1080 msedge.exe 1044 identity_helper.exe 1044 identity_helper.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2036 1080 msedge.exe 86 PID 1080 wrote to memory of 2036 1080 msedge.exe 86 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 3448 1080 msedge.exe 87 PID 1080 wrote to memory of 1180 1080 msedge.exe 88 PID 1080 wrote to memory of 1180 1080 msedge.exe 88 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89 PID 1080 wrote to memory of 8 1080 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Components.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ae5b46f8,0x7ff8ae5b4708,0x7ff8ae5b47182⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1347871010083907281,13457299340398365140,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5516 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
6KB
MD59e76e9f1589c9fb32e04c0e800b77269
SHA198ede306b7fe577c7ebef40c7668b35e8b7e3440
SHA256d0f7093615a687e2961b1cf9910cf062c9b49b2c2fb8eb4c839cb38739a62ebf
SHA5123d1b27ac87f933574eab9fdbbc2d4001d88dfa769b9f268869e2ba81586e9b6deeb4e2de9582eabbb7ececb0cf0c246fa89820c23fa3ec4b2f379a12ace87a79
-
Filesize
6KB
MD54a437ba8ffd9e39bf1d3bbf79c3399eb
SHA1d4f441fd73ea2938822c725c7a1ae1404667a9a2
SHA2564e6d3e53aff5e9ea8f5abab3e353790b51c718e45e96fdfdaa05ec568c8175a2
SHA51236457b121aa8c42245d9b64969237c20e2d7ae32f002e08aa2058249088be180a83882aef757acb94c1af968cdc9721229e417b588b0bb1f2826e0c4a871ac3a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a8d000c12449473506f2516db4a5f76f
SHA1f4e240c916d83ddc380d4fbd7117898c02431d32
SHA256ec02a3ed8de8ac66268452cb1d187b7180f4e83578bd6611ae994190e49a4745
SHA5123f7a40451911969453092881cb798b02958fe80b4f7fc80f1f29dba74c00b66d7849a0c3420d8828abc9478576871edf45d2ba60e6c4ab84ee750930409a67c3