Overview
overview
10Static
static
3b7938b29a7...18.exe
windows7-x64
10b7938b29a7...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3152605369.html
windows7-x64
3152605369.html
windows10-2004-x64
31916524053.html
windows7-x64
31916524053.html
windows10-2004-x64
33072838935.html
windows7-x64
33072838935.html
windows10-2004-x64
332093631739.html
windows7-x64
332093631739.html
windows10-2004-x64
3910218026.html
windows7-x64
3910218026.html
windows10-2004-x64
3SuggestBox.js
windows7-x64
3SuggestBox.js
windows10-2004-x64
3Uninstaller.exe
windows7-x64
Uninstaller.exe
windows10-2004-x64
ads-the-in...d.html
windows7-x64
3ads-the-in...d.html
windows10-2004-x64
3locales308946821.html
windows7-x64
3locales308946821.html
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
152605369.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
152605369.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1916524053.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1916524053.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3072838935.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3072838935.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
32093631739.html
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
32093631739.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
910218026.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
910218026.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
SuggestBox.js
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
SuggestBox.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ads-the-internet-the-icon-revealed.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ads-the-internet-the-icon-revealed.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales308946821.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
locales308946821.html
Resource
win10v2004-20241007-en
General
-
Target
3072838935.html
-
Size
16KB
-
MD5
166625d3a963d2c518dc1aad618d2144
-
SHA1
2cbacc49cf8d3c8989c0f998a82a667fb8763929
-
SHA256
45631acf483352f9498790b044b8a7af9e01e5add669746d7ad116601ff5ec50
-
SHA512
a5aaedc779da1044fbd484af64f1720180301acd6ab75086acf60178122b1b2461b9ed50efcb2994e0cb658fa1b7ec529a8758b7e0b5ad14ec510f8a6d5dfd38
-
SSDEEP
384:N5P+5Ps4/zZBdDWjbzeQYSCMqPM9wUHRvThavsjOcJP9x3qJdU9Kw1vKUd2jMDW:NUC4/z12QKd6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 4736 msedge.exe 4736 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 5068 4736 msedge.exe 82 PID 4736 wrote to memory of 5068 4736 msedge.exe 82 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 2176 4736 msedge.exe 83 PID 4736 wrote to memory of 4872 4736 msedge.exe 84 PID 4736 wrote to memory of 4872 4736 msedge.exe 84 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85 PID 4736 wrote to memory of 4496 4736 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\3072838935.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a2d746f8,0x7ff9a2d74708,0x7ff9a2d747182⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,8524023050140844043,10882942713030574882,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
5KB
MD5974a08efea048b0f059702f023f80b73
SHA112dcc0d64cbc0ee1ca5d25b033aa2ee20442bcc9
SHA256bb9b564d1fa9ddc95106888fb7324f32c3370ef8474a0eb0cc38641c79317dfb
SHA512a96a902ef4a276bc7105e8092b62ef8f6adf0713e09cd5372fb6a7a15d0262e5733e56cf410a444f3c69915897699e53a8ce07927283f5d24eef7af4fdc01585
-
Filesize
6KB
MD5532abcd27d57f0637a58778c4a33d3fb
SHA115803d5c664755a1b151a12a3e3300199495c7d5
SHA256c54ab3d36f50d9204466aa53ac8ec0f78849d02e243e2e514354aa9b70c09182
SHA5120eca5ae1aff15269c14a35606c72197d1930e0a39c7bb76148cfb6c2e939796bfc204167cb3563b5429f2a2e09a1dbb16e9f860847f783bd1fb716a9daaaf49f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5aa7cb00e7c476c7ebeae4ed4f0876370
SHA1774e12c65a50acec23591f12f9a706be47391eba
SHA256e13903320480d3962d2aaf74449a8ec66b8f9cb9363044ba0c0a19cc965b436d
SHA512fc6d6f93ad3063b58968dff194786e13bd72ee502f7975c9074ce3f33113d244ad649a4a3b9adf902338f06ef266385041896ccd26887e49ab483bddd063f100