Overview
overview
7Static
static
33691a72927...18.exe
windows7-x64
73691a72927...18.exe
windows10-2004-x64
7$PLUGINSDI...RL.dll
windows7-x64
3$PLUGINSDI...RL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$SMPROGRAM...վ.lnk
windows7-x64
3$SMPROGRAM...վ.lnk
windows10-2004-x64
3155�...վ.lnk
windows7-x64
3155�...վ.lnk
windows10-2004-x64
3Alchemy.exe
windows7-x64
1Alchemy.exe
windows10-2004-x64
1bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1readme.html
windows7-x64
1readme.html
windows10-2004-x64
1uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
3691a72927d53f0d6c9b38343a0999b9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3691a72927d53f0d6c9b38343a0999b9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BrandingURL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$SMPROGRAMS/ַ/155ɫվ.lnk
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$SMPROGRAMS/ַ/155ɫվ.lnk
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
155ɫվ.lnk
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
155ɫվ.lnk
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Alchemy.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Alchemy.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
bass.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
bass.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
readme.html
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
readme.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
uninst.exe
Resource
win10v2004-20240709-en
General
-
Target
readme.html
-
Size
10KB
-
MD5
2291653c39db689535131d0d7a37db3d
-
SHA1
aa36eb095b6795adbf7832495ee5af41a9740aee
-
SHA256
79123ca49297bac41bd0f4ce988828187be3c675d71682d8938643f625db2bd9
-
SHA512
737cb31585051e55d84477dd7bf35293ffbdd5fbe6b8d0a48b5154aac6148384546dbbd49b049b90dda0b3f9bf3ba48429e60cef9c97bfecfe3b733681057ede
-
SSDEEP
192:zvUsUDGMaUK0KcLytElnSwrARVMIR4IpnmqMJTQ99G68jEJCK07OumDonNe0WELZ:Dw2tCSygCRoJCKMmDoNQEprs1rsx3yBK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3876 msedge.exe 3876 msedge.exe 4336 identity_helper.exe 4336 identity_helper.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe 3876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3876 wrote to memory of 396 3876 msedge.exe 84 PID 3876 wrote to memory of 396 3876 msedge.exe 84 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 1268 3876 msedge.exe 86 PID 3876 wrote to memory of 3408 3876 msedge.exe 87 PID 3876 wrote to memory of 3408 3876 msedge.exe 87 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88 PID 3876 wrote to memory of 3232 3876 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\readme.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8705946f8,0x7ff870594708,0x7ff8705947182⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,6638113419746122123,6829927038877739703,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD5077b910d6c6fe42e2539b2c5c4093f5b
SHA1c4e06dc77169e2f861d31f3145304db7dbadb36c
SHA256df477bc7422391a0d56a8e130792bb66ffe5d9e13f6994da69b381ff93d78e60
SHA51256a9715c0acb2c4117a3f6a42ffd3353bf63bb2f8bd9311c923669721e1b15bd8dc5ef80b7d464aac0233dab91a96a424edb72442dee5698642ba609306a85c0
-
Filesize
6KB
MD59cc19881ebb78af71d75d4fc599706ab
SHA183ab525fec94eb29a592dd0ebf949ec1b85d0bf9
SHA25616460eaa48f531592d1942729d9fdbb8cfd7ec2bef9069c97c18f65f02fb8088
SHA51238dfafa990693b824a5480496796ac14cd8e18c2d060b41289eb2ae8c57d5693b195878bf33cdd553459a8917c9455f5a0f1546276cb2cc17d8af74a507d23ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f6b3ccf473b1443db78d697a13cf532c
SHA13e2c00afc57641213a38c3cec8bf7c2004341a0e
SHA25607d2f04f02445407df70ca6840f90ece6d21208b1a1e334818ef3e3f8a7851c6
SHA512f358808f4d869daa968a4a61ad5d2b2e02a02a7d4625ed2d4a2e27ee8070695c6e687202c919186504a89a1e9f86ab866e1a3e635543cdff32742aabef6217d5