Overview
overview
3Static
static
3b51716cf0f...18.exe
windows7-x64
3b51716cf0f...18.exe
windows10-2004-x64
3$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDIR/nswg.dll
windows7-x64
3$PLUGINSDIR/nswg.dll
windows10-2004-x64
3$PLUGINSDI...e.html
windows7-x64
3$PLUGINSDI...e.html
windows10-2004-x64
3$PLUGINSDI...w.html
windows7-x64
3$PLUGINSDI...w.html
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
b51716cf0fd0cd7d75e525107fb13653_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b51716cf0fd0cd7d75e525107fb13653_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InetLoadEx.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Progress.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Progress.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/blowfish.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/blowfish.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nswg.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nswg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/welcomepage.html
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/welcomepage.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/welcomepage_noadw.html
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/welcomepage_noadw.html
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/welcomepage_noadw.html
-
Size
5KB
-
MD5
503788b7c7fc1e94d3881697dc0f9455
-
SHA1
c9710548dd90191732aa428957988039d9014ced
-
SHA256
bff319cb4251e23c995abc742d926b7c85b9798783ac9dad8e8cdc274ede423c
-
SHA512
138f60cc8d168004325dcf2452f24fdd29a3fddc6f693326d01c614a6638c1d40ce9f7b1766b9440de8012d05977adc0f2b92eb02aa76d44ee7dfbc99cd24748
-
SSDEEP
96:SI32bJbWEMkTSf7qOugnffDbhIDbbE5zDbnwEqqc/zIxG1DuspXdNy7Pt:SI0bWEM6Sf75ugffDtIDHEBDzwfF//4r
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 3140 msedge.exe 3140 msedge.exe 1384 identity_helper.exe 1384 identity_helper.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3560 3140 msedge.exe 84 PID 3140 wrote to memory of 3560 3140 msedge.exe 84 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 1828 3140 msedge.exe 85 PID 3140 wrote to memory of 2488 3140 msedge.exe 86 PID 3140 wrote to memory of 2488 3140 msedge.exe 86 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87 PID 3140 wrote to memory of 4860 3140 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\welcomepage_noadw.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff526546f8,0x7fff52654708,0x7fff526547182⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4446107425428973085,3276343276746346147,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD50579bba01427a423e19af8c50d7add8d
SHA1904c173841ae8324d9cd2593c74416e0674f650a
SHA2563353d586e199538893a3ca3f8eb23f7120c6c4131fe12e78146c2cdbc7388049
SHA512e1e94c605c34ba7c1cf8bbe8af85317efd4e04086e618e439a9b831ed27ddbea16fa92308a630cd872184b9af85037a3829d4e3f99a79b3e07b565915eef0db8
-
Filesize
6KB
MD566950c9bdde9a3f4d336fba198ca8fcb
SHA14039b32294e2cbfa82292c3a7372ce225f66500f
SHA256bd8c5cb49f09539fb5283376a54941fcef6dc1c9bcd1f9187e0dfe3e4f22c89e
SHA51298815d000e84bf03d57f3790fadf64157e42121ffead8c534c47f02e1994d4a0d53833aa0b80481ede682c72b38065040c3fe0f7c26964401f1f16cdac60deb0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52a87e67e0ee3d8bcc8f8abe6de497aef
SHA19d078a272166a7b830b21c5db2ff7406f396f8c1
SHA25634a3375d4867557bcf22d5002bba94cb34398da06da796920c07d4768f2eee4b
SHA5126ea900b08cffd120515f451f5d8428157e6ae0f5458665a44a24a9fa505d5320fa40dc27c08b1804fc9d5d4d9c749509354ffe069e4761c7cebbc8bf9b12064f