Overview
overview
7Static
static
32e90350580...18.exe
windows7-x64
72e90350580...18.exe
windows10-2004-x64
7tbu08508/T...ls.dll
windows7-x64
3tbu08508/T...ls.dll
windows10-2004-x64
3tbu08508/T...r2.exe
windows7-x64
3tbu08508/T...r2.exe
windows10-2004-x64
3tbu08508/f...ch.dll
windows7-x64
6tbu08508/f...ch.dll
windows10-2004-x64
6tbu08508/options.html
windows7-x64
3tbu08508/options.html
windows10-2004-x64
3tbu08508/tbhelper.dll
windows7-x64
3tbu08508/tbhelper.dll
windows10-2004-x64
3tbu08508/t...945.js
windows7-x64
3tbu08508/t...945.js
windows10-2004-x64
3tbu08508/u...ll.exe
windows7-x64
3tbu08508/u...ll.exe
windows10-2004-x64
3tbu08508/update.exe
windows7-x64
3tbu08508/update.exe
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
2e90350580b08a649727b30270d37ef3_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e90350580b08a649727b30270d37ef3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
tbu08508/TbCommonUtils.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
tbu08508/TbCommonUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
tbu08508/TbHelper2.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
tbu08508/TbHelper2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
tbu08508/frame_search.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
tbu08508/frame_search.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
tbu08508/options.html
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
tbu08508/options.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
tbu08508/tbhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
tbu08508/tbhelper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
tbu08508/tbs_include_script_024945.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
tbu08508/tbs_include_script_024945.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
tbu08508/uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
tbu08508/uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
tbu08508/update.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
tbu08508/update.exe
Resource
win10v2004-20241007-en
General
-
Target
tbu08508/options.html
-
Size
6KB
-
MD5
fd8849019b63eb260f5f186b22533105
-
SHA1
e8a31cba1c546a8700f9d735796ba4ea790b99fa
-
SHA256
3c9194d22edcb69af24a2f380a4a6a0d1bb56068a4fe322c5341af77d0e26f98
-
SHA512
7d154b2b3c7f5048b5a64e53687d085e77b1764a085adff04b74b9feab04de716c46ccf893aca48becad6dd585e4c1d6b6fa0a40afda90a7463f4188ac976324
-
SSDEEP
96:BEQ/O9mOdYCQiLFyzNYsf0Yi67mX9gPui39bnLNza7/OBgx4wTn:Bnj1cFUYfYnV6Bm8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 1164 msedge.exe 1164 msedge.exe 2460 identity_helper.exe 2460 identity_helper.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1164 wrote to memory of 3384 1164 msedge.exe 83 PID 1164 wrote to memory of 3384 1164 msedge.exe 83 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 2280 1164 msedge.exe 84 PID 1164 wrote to memory of 1548 1164 msedge.exe 85 PID 1164 wrote to memory of 1548 1164 msedge.exe 85 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86 PID 1164 wrote to memory of 1044 1164 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\tbu08508\options.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef9cb46f8,0x7ffef9cb4708,0x7ffef9cb47182⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9372973290629828243,18303191952291289295,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD5ad25fe886d69dfd7ab60e609c9b67caa
SHA15ac54f6d507f2bf44c1776d87690e9b7a2306824
SHA256954ad5880a731bd2832918a80d404772471087d828f427d96b4f7c3a3b5aba4a
SHA512b5ddbcaaab20d4ccb9732e984b41049c17c84fa5621976ff8445d2ec5b448ac41b8e3f8e629ea5962fcb92abfd524ff6069fbccb7d7d3782567d003872c79c2a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fc8c605c-d5df-47cc-971c-8ee9599280f7.tmp
Filesize6KB
MD51412ec240c52104b798f7f5ae58ac317
SHA14a3f3b5ca7f49a33d0a9aaf985c1c5e380a95b41
SHA256775dd426a775dc59127866325e5fb6c164fdc2833111b039896694d9f473ae79
SHA512638dfeb3268f0ca9b0a5360bc39456f1512d7e75a6ceb4f0e10b87eab1c21bff90980e80104376727507b85ed42b5adb7bf23499191fc4f70309ee008acf7d90
-
Filesize
10KB
MD5e9fc7ee1e21f3cdb146d11d94b1c8491
SHA17611a03ba9e0febe26c39778ddde1edf9c033853
SHA256c8732b73d5aebca35514762a0d82def051e27dc2e6462a30f23c7a79304638d4
SHA5126379806ea8b15cf99d9ba328a220c2f8f73add83830ae4247d156345b235e47130310ea1c6d7ffde6f92729a119657730c84fe6f3e1994d1a64d2e94428f2f72