Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
ddfdf54b572336ea05559d96d71fc438_JaffaCakes118
Resource
macos-20240711.1-en
Behavioral task
behavioral2
Sample
Disk Image/VisualRouteLite.mpkg/Contents/Resources/en.lproj/License.html
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
Disk Image/VisualRouteLite.mpkg/Contents/Resources/en.lproj/License.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Disk Image/VisualRouteLite.mpkg/Contents/Resources/en.lproj/ReadMe.html
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
Disk Image/VisualRouteLite.mpkg/Contents/Resources/en.lproj/ReadMe.html
Resource
win10v2004-20240802-en
General
-
Target
Disk Image/VisualRouteLite.mpkg/Contents/Resources/en.lproj/License.html
-
Size
4KB
-
MD5
738afc385f9d339118e0824e16f4ff4c
-
SHA1
bd917682a1035954a80aa0cbb818a006eeb0d400
-
SHA256
56e09a2d5d32d5d96d2a2fc0eac70664edbc0080188eb95afbbd4acfbc7c03f2
-
SHA512
3d8bea297bc8ee6c2822e4393cea248cdca6e4f9f5f94e7ea3977176a393ba0832d62af998cf2a5160d18c508a7caf8556babc935eb1281a701e36590d9554ca
-
SSDEEP
96:NGJ3XJnKTSds+qGlhqin1Ftx4PckEHBiSGXfT0Yvip+EyfzQlaL:Ne3ZnKmdhqUDvHBvYgPyrQY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 2336 msedge.exe 2336 msedge.exe 3396 identity_helper.exe 3396 identity_helper.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2400 2336 msedge.exe 83 PID 2336 wrote to memory of 2400 2336 msedge.exe 83 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 4396 2336 msedge.exe 85 PID 2336 wrote to memory of 1224 2336 msedge.exe 86 PID 2336 wrote to memory of 1224 2336 msedge.exe 86 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87 PID 2336 wrote to memory of 4060 2336 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Disk Image\VisualRouteLite.mpkg\Contents\Resources\en.lproj\License.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc36446f8,0x7ffbc3644708,0x7ffbc36447182⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,17973403525355346206,6010971702699756544,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD555050679fbec56892e27623802cbaf8f
SHA1c125aaaf0333ff376b0da1979c190fdec589e5b9
SHA256fddffb97df3c2755331e1316e6f1caa87e3d2813b1ec104382895ea9fb7015a0
SHA51295559127f0caedfcc58add9299c91180806ca2f974a40f5371e91d3ec51d20cd738bbfca5e0a93b5f391babcc00a286d2393f07f0f3f96807e2be0890391e49f
-
Filesize
6KB
MD5c8c8420dd9843cd35a2e99a719a4af41
SHA1e3db937c6d9b601f53d31bce6c61e6d2d57777d2
SHA256ae1f80ef03c904efdf62e6758c342be46663a4f51e841a8ed2a176dff0cf4ffe
SHA512a2823a2715b7d680b7367b60ff3c6e62cff49fceaf0318476022ddcee0db5f63c42cb782ae48e2dcd4d6ab7f47177889f64909af99cb37f3bc1885243ced9f42
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51c72e28e23c19c9795f47deef787d0b8
SHA12427e8d055d358c115b1bb043afff3d28d3b8d91
SHA256a3041cf937fdeeb6e619828b37ba13482ccaf77dfc3b9013f0a7fe84602a4583
SHA5126ee47cedc9b865b6097df17a060055727a746d3d13b799b6dfc17ce67e3992b58b9b8893636525de204b0b4622195970d28e638548010f8f837efa9fa3d29fd0