Overview
overview
7Static
static
318b2c9f1c8...18.exe
windows7-x64
718b2c9f1c8...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3114la.exe
windows7-x64
1114la.exe
windows10-2004-x64
3115br.exe
windows7-x64
6115br.exe
windows10-2004-x64
6html/404error.html
windows7-x64
1html/404error.html
windows10-2004-x64
1html/config.html
windows7-x64
1html/config.html
windows10-2004-x64
1html/error.html
windows7-x64
1html/error.html
windows10-2004-x64
1html/last.html
windows7-x64
1html/last.html
windows10-2004-x64
1html/start.html
windows7-x64
1html/start.html
windows10-2004-x64
1html/stati...est.js
windows7-x64
3html/stati...est.js
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
18b2c9f1c8d5b803a596fea995b15b4d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18b2c9f1c8d5b803a596fea995b15b4d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
114la.exe
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
114la.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
115br.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
115br.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
html/404error.html
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
html/404error.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
html/config.html
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
html/config.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
html/error.html
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
html/error.html
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
html/last.html
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
html/last.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
html/start.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
html/start.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
html/static/js/suggest.js
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
html/static/js/suggest.js
Resource
win10v2004-20240508-en
General
-
Target
html/last.html
-
Size
1KB
-
MD5
818bd5ddb60968a3c2be79a6f50ad313
-
SHA1
9589bfd443304e4c9bcb93b2ac3c005b98781086
-
SHA256
05057814feef59bf559be70ec5ac51b6ac75e9423774e47160a99387c877f30e
-
SHA512
addae497ddd275fcbc318ee55a9768146f23b94f17f58f958aa26c6360ee3064b1701a0abbd9749da8e6e21200ca61198a774fd0f9ace9cef6cc7e7e6840ecd2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 368 msedge.exe 368 msedge.exe 4560 msedge.exe 4560 msedge.exe 3708 identity_helper.exe 3708 identity_helper.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4560 wrote to memory of 4820 4560 msedge.exe 81 PID 4560 wrote to memory of 4820 4560 msedge.exe 81 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 728 4560 msedge.exe 82 PID 4560 wrote to memory of 368 4560 msedge.exe 83 PID 4560 wrote to memory of 368 4560 msedge.exe 83 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84 PID 4560 wrote to memory of 3784 4560 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\html\last.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847182⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13716600377318667360,8179607438109299179,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD5210d2153dfab37f29c56b1ea9e5ff2e5
SHA105cde9925a8e79d8f61afcc145d98b8e95d14490
SHA256629ee76928444c84a0f45202cdf27cd8f3177f785e271c9e812d142a173ff46a
SHA51208c03cb3ff8ecf2cb6d3ebe78e1e489e1ee88bc35f9dd945f561be0d184f74993ba6ba6c17cfb16b255d0c363101e551cfb4bd62e155b25718a87db474cc290c
-
Filesize
5KB
MD51e9b6219e5dd3cf434333c0f6dff3958
SHA12b672bd0469375c92f2adffe1c686098298874de
SHA256c0ffcde8efbafd215fd6fdca7d8deef6b6702e9f1d03c6416f1f61b299734c2b
SHA512db0e76901fd84060b575d0c04c6e7cc678fdbb58fb38edaad2e4602366e7e29f97c5a4e022ce2b65f6c10263148ff2bb23495adef293646783dceb35f2df3776
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f695de222ccddb507b1b0422af3fceb4
SHA1812c3fc39ccf07d99a5a76511a2b1938a30b3107
SHA256898364dee07511c1410ecef54ca4c3e77ad20f372939a288b75dda38d2dbf701
SHA51242deece85b3044f4705c599ec13cbe517a010509480955ddc009eb6ad35e8d43c0eca461a9fa2c4c25459d3f87e3bd3f4ecc047d423dc5002541895db1838fc0