Overview
overview
7Static
static
7d58e75cc04...18.exe
windows7-x64
7d58e75cc04...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/Dialog/7za.dll
windows7-x64
3$TEMP/Dialog/7za.dll
windows10-2004-x64
3js/bramus/...ler.js
windows7-x64
3js/bramus/...ler.js
windows10-2004-x64
3js/def.js
windows7-x64
3js/def.js
windows10-2004-x64
3js/prototy...ype.js
windows7-x64
3js/prototy...ype.js
windows10-2004-x64
3page.html
windows7-x64
3page.html
windows10-2004-x64
3page2.html
windows7-x64
3page2.html
windows10-2004-x64
3page3.html
windows7-x64
3page3.html
windows10-2004-x64
3page4.html
windows7-x64
3page4.html
windows10-2004-x64
1$TEMP/Dialog/sfx7.dll
windows7-x64
3$TEMP/Dialog/sfx7.dll
windows10-2004-x64
3opengl32/opengl32.dll
windows7-x64
7opengl32/opengl32.dll
windows10-2004-x64
7Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 03:04
Behavioral task
behavioral1
Sample
d58e75cc04bd3bd64c692aeef1170779_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d58e75cc04bd3bd64c692aeef1170779_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/Dialog/7za.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$TEMP/Dialog/7za.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
js/bramus/jsProgressBarHandler.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
js/bramus/jsProgressBarHandler.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
js/def.js
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
js/def.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
js/prototype/prototype.js
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
js/prototype/prototype.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
page.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
page.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
page2.html
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
page2.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
page3.html
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
page3.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
page4.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
page4.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$TEMP/Dialog/sfx7.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$TEMP/Dialog/sfx7.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
opengl32/opengl32.dll
Resource
win7-20240903-en
General
-
Target
page2.html
-
Size
1KB
-
MD5
766e516a9b6ad55bda38d9a3a5762d89
-
SHA1
40707196f3df4985a85062268130f60217bc487f
-
SHA256
ad34f745edbed1e9cc41592b8c94f8036f37f659bc13bc7fcafa9e96b6f44f51
-
SHA512
f00977a238c537649da46287d327a3b9a286a8fe717fbc25886848b7a19492a71d188a5cb9668c2600a618121c8738bc5d57f46ff578ce33572aa76f114c1602
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 4684 msedge.exe 4684 msedge.exe 2888 identity_helper.exe 2888 identity_helper.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe 4684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3424 4684 msedge.exe 83 PID 4684 wrote to memory of 3424 4684 msedge.exe 83 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 344 4684 msedge.exe 84 PID 4684 wrote to memory of 3544 4684 msedge.exe 85 PID 4684 wrote to memory of 3544 4684 msedge.exe 85 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86 PID 4684 wrote to memory of 3604 4684 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\page2.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8540646f8,0x7ff854064708,0x7ff8540647182⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6139305541984154709,10327043782235883909,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD5a35cbbf82a907df7ba45a96c43f42ecb
SHA11f809d87e0b55fc0f89210436d05f0af5cab1611
SHA25654f660c75aea1e573e77b7320d65452e6f6256e4b11ce6fab884a6d3100e923b
SHA512cc18bc8b1b5e853dace4fa46c281bd6543183e39afac336fa5dda360e2c8a389e61fb012e32f9bdc4a1a8640660161a0d1e0adbeb50032cb9faf01ede1916c00
-
Filesize
6KB
MD5a02da2e1825d8b08568643d3029d8705
SHA1ed8e6b2795262b538f33141aa09f7d7694b9b8aa
SHA2569ac870a1a7ca31f6608e18c3e5179be246a59eb6c5482e6907319267331950e5
SHA512331bc67b3f0c7bf829e62d53b2957a58c3478201112cbe9868e5d1ef7e37f45135d7facde5f2f3b6210b1e4b835240072f6e2072364dbed0bb1950c2b408739d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b5a30a9a62d5ee037b6202e0b3ce50f2
SHA15f96bfa7f8ad6a3a9399bd21a6ded42d5569b504
SHA2560705b29ed2c9f0329e93af533a7efce9ffa469e88530eb33a846b1bdc749dc6e
SHA512894a82e7f239a501cca3c1847b088f3dc20b835945306915604619f1f18986c96eb861b2abf87acf2838c219ed7a75c3eefcc00a9be49968db29608384db8e29