Overview
overview
10Static
static
3ee8bca478d...18.exe
windows7-x64
10ee8bca478d...18.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3500.htm
windows7-x64
3500.htm
windows10-2004-x64
3DumpLog.dll
windows7-x64
3DumpLog.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
ee8bca478d4c26182df5a6aebddb4474_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee8bca478d4c26182df5a6aebddb4474_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
500.htm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
500.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
DumpLog.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DumpLog.dll
Resource
win10v2004-20240802-en
General
-
Target
500.htm
-
Size
1KB
-
MD5
af35cc4818a5c71b23b3458d91951293
-
SHA1
91e32267493a44e0bbbaeacf7cf20e6d6095430b
-
SHA256
6836c2e7c6237059fb0dde27a99dcd70c25346de2357d8723cbc21be92d71e8e
-
SHA512
78d3db830c1fb85ec6244fe8731f9d8521c4ac0f0ad0ca9fad77941036eff634bd6cb12895653519cb2291f791dc3b9dc6e9592f7d78ddc50f4fb47665cf17ce
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 656 msedge.exe 656 msedge.exe 3240 msedge.exe 3240 msedge.exe 2988 identity_helper.exe 2988 identity_helper.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3968 3240 msedge.exe 82 PID 3240 wrote to memory of 3968 3240 msedge.exe 82 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 2628 3240 msedge.exe 83 PID 3240 wrote to memory of 656 3240 msedge.exe 84 PID 3240 wrote to memory of 656 3240 msedge.exe 84 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85 PID 3240 wrote to memory of 4492 3240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\500.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff381446f8,0x7fff38144708,0x7fff381447182⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16230617662616178744,7702951803320806263,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5b357d909c5a052fddecbecd062c593eb
SHA11442a151a6c55a71a306d38f680e15428ced71a0
SHA256612540742cf2756ab8f8f92bb38196b00fb17b5c5f5c9169e51d36b9127c203b
SHA512d6e68588019d3e569fd8b62d9513f99cc1f543765b5cf2d37d5222edd121c1f1199086f85d78737ca07d519bcb8f172ef4e0d471bb6b572eb545a7afeba4e15a
-
Filesize
5KB
MD588ef52942abbfcc7864787a18477af3b
SHA1aec378878dd29bbbcfd920e3d62575b5faa69153
SHA256adf92b78b48c935aadbaa4b81a8070b0dbf80bbe63314746ec4d60bf37a80d2d
SHA5121c444dca74dcd3ee61667fd843af8b81795351a46b563bc4e4c42c5adad8fde5909c51011c1e31fbae0f28caff1f153d5dd0775e33630da8973ff2da6f1d5dd7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54c2a0331bb2783ec5f73dca26897769b
SHA11db8d68ca698c14994f8738410174727179a3fb5
SHA2568cbbd5d70872e2c76b5570dd742bcdadfea1702bd33b60997aaa6141f24f7b8d
SHA512ccd6ca9675cca089463911522e2bf8e7a1c9964afa141f191078c5d632fa44348b36fc13c04ffa48310925a50b83235dadc6d9d1dd0ede7bfaf121df82e8d856