Overview
overview
10Static
static
39401bdd3dd...18.exe
windows7-x64
109401bdd3dd...18.exe
windows10-2004-x64
7$1/$OUTDIR...er.exe
windows7-x64
7$1/$OUTDIR...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Dedicated_...s.html
windows7-x64
3Dedicated_...s.html
windows10-2004-x64
3cse.html
windows7-x64
3cse.html
windows10-2004-x64
3lightbox.j...503.js
windows7-x64
3lightbox.j...503.js
windows10-2004-x64
3postproject.js
windows7-x64
3postproject.js
windows10-2004-x64
3visualizat...s.html
windows7-x64
3visualizat...s.html
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
9401bdd3dd74040b371abb07d85c9914_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9401bdd3dd74040b371abb07d85c9914_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$1/$OUTDIR/sftp_plugin/tc_sftp_uninstaller.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$1/$OUTDIR/sftp_plugin/tc_sftp_uninstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Dedicated_Servers.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Dedicated_Servers.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cse.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
cse.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
lightbox.js1651793503.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
lightbox.js1651793503.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
postproject.js
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
postproject.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
visualization-analysis-options.html
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
visualization-analysis-options.html
Resource
win10v2004-20241007-en
General
-
Target
Dedicated_Servers.html
-
Size
9KB
-
MD5
b45ae64cf604718ee1b1480f65e5a59b
-
SHA1
95144af22f340dc4cea529bc3cf327a38087b6b3
-
SHA256
458812095cf89dda6f6ece87a0f0e3937e3cc07313f5d48a12c73c85cdeece85
-
SHA512
4aad7e3540bbee6018f7b2ec7cbde0cf32a189a30cfd5e5832f6e092eff4867867472e179b1b06d6e69a5fc1fe04c0ead2974f23871d955d9cd779246b9c2ec2
-
SSDEEP
192:9uBogoPBk+PKrZlmI6Y1AfS2wBoj7bgl9YMgQ679tYxcKlwnfZnZgGW:so1lPKrZlmILAfS2wBuAlS66g2Klw9ZI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 3824 msedge.exe 3824 msedge.exe 1908 identity_helper.exe 1908 identity_helper.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4156 3824 msedge.exe 83 PID 3824 wrote to memory of 4156 3824 msedge.exe 83 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1544 3824 msedge.exe 84 PID 3824 wrote to memory of 1688 3824 msedge.exe 85 PID 3824 wrote to memory of 1688 3824 msedge.exe 85 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86 PID 3824 wrote to memory of 4068 3824 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Dedicated_Servers.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf21a46f8,0x7ffaf21a4708,0x7ffaf21a47182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2356 /prefetch:82⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3020 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,4000954660869410651,2515926704340232640,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2432 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
5KB
MD56102f7ce623f42baa76fc387b396f9d9
SHA12d246d35966f21fbd9815c139217197c52d87cf2
SHA256317aa13219697d0bb302758cbd1c348be7099240ce01ad321f49872aec3ee0dc
SHA512f3edec8979d07782c82e26c7ee9098dea899f614c9b5391244db93d298239b5bfc25dafcde621be2c154cc04f7fd734ca588c4bcce3f57aae54415af522c7125
-
Filesize
6KB
MD56fe45d45ab48c18ede8c3497a29f95e7
SHA1a6a6a9430e67e959097a1f8919730962eb53b6d5
SHA25682e22c1d5a52dd9a4dc3531b2ec03367bcc9a991f994df1c50199b9379ab0b83
SHA512a24180f9e84931c8c32c13c135f8d2850a716b25c149e30f6060f568edf42e67686f975610c3e12d0bcf9ff18cb994057f6e5004e5ce5a6882b8e934c7ea35fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD558a56555b2cd19d7087b38a913f0b16e
SHA155980868ab705a516ed31fc5671abc2397fbd336
SHA256a01f425b94d30e1c6a6b8bc1020d85a416434ef32bd618b8bdb176827bbebe4e
SHA512c4fcee996f33702690a734cf68f7277c07482a7f796ce36c51d94fb1a08a3fbd4c81207eb23480af4764ed8f94db9a26757226c636de1bb8718e4f12d20259b5