Overview
overview
10Static
static
3b7938b29a7...18.exe
windows7-x64
10b7938b29a7...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3152605369.html
windows7-x64
3152605369.html
windows10-2004-x64
31916524053.html
windows7-x64
31916524053.html
windows10-2004-x64
33072838935.html
windows7-x64
33072838935.html
windows10-2004-x64
332093631739.html
windows7-x64
332093631739.html
windows10-2004-x64
3910218026.html
windows7-x64
3910218026.html
windows10-2004-x64
3SuggestBox.js
windows7-x64
3SuggestBox.js
windows10-2004-x64
3Uninstaller.exe
windows7-x64
Uninstaller.exe
windows10-2004-x64
ads-the-in...d.html
windows7-x64
3ads-the-in...d.html
windows10-2004-x64
3locales308946821.html
windows7-x64
3locales308946821.html
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
152605369.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
152605369.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1916524053.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1916524053.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3072838935.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3072838935.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
32093631739.html
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
32093631739.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
910218026.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
910218026.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
SuggestBox.js
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
SuggestBox.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ads-the-internet-the-icon-revealed.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ads-the-internet-the-icon-revealed.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales308946821.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
locales308946821.html
Resource
win10v2004-20241007-en
General
-
Target
locales308946821.html
-
Size
9KB
-
MD5
e1c9d5227511bfabc3ae00fc6e9be3f1
-
SHA1
e06944733b698b5d7694ca26b6e22f72a5f5ca45
-
SHA256
7359cb76dc905b11e82b520638f0710875720b853ab05536a8d3e4a65f4d6efd
-
SHA512
eb5439f063e9eb6ae2b1fd7f9b693368190d30ef69515dd63524cfedc372183ba15bc7bc913512c1f616a735dc1ac917950681fff1bb180c577f66a58cadf0f8
-
SSDEEP
192:hB8vIGNu4q7E2q1To+uM+SqIWqdGukegYr4/:hcc4O91q2erk/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 380 msedge.exe 380 msedge.exe 2260 msedge.exe 2260 msedge.exe 3224 identity_helper.exe 3224 identity_helper.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1996 2260 msedge.exe 83 PID 2260 wrote to memory of 1996 2260 msedge.exe 83 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 5028 2260 msedge.exe 84 PID 2260 wrote to memory of 380 2260 msedge.exe 85 PID 2260 wrote to memory of 380 2260 msedge.exe 85 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86 PID 2260 wrote to memory of 4172 2260 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\locales308946821.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa333046f8,0x7ffa33304708,0x7ffa333047182⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 /prefetch:82⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,1533824382623675647,13036384136265733824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
5KB
MD592b7e7f5f77c334abda1096d6179b3d9
SHA1555af743b161dd6830cef421edf5db4cf06200ef
SHA25674ec9b7305a73cfac07c84fed52c85d3c1aab09aff3225dd66404487a3288a14
SHA512c50880822ca2ccf86a619f4afea8123ad33f95469cde91880e2fda2ac8a40d27b53e358390a2ba5f9a84eb72e7e3ba9917afbea301abd3c1a027b30c2ebe4eb4
-
Filesize
6KB
MD5041c89c227d0c398eafe81681128b3cd
SHA1d5e9d8c4216a3f8ef292c93025459ff5caf4096c
SHA256dae627be5a3fe3e3e53978e790eb9a7c567f2a938377e55380bebb8bb4bca900
SHA5125fbad720303f5864ac2e8c1433f781e7ab87447c49610f48fabe5847024c1298d16bd5be6275b299a5f090d49e7b2d763b7d78ea6c0d6c0f4bdabd8969acc18d
-
Filesize
6KB
MD54d39fb3955d39ac1fccebf99751261a3
SHA1997a822c52d5bdb1f342ac1e0aa56921448adf11
SHA256984aee09f0a96e22ec6f86f198c2dc11d18de288d2b587207bd128473eda95a5
SHA512e7135acafbaae38bf372e0dd8b28f703d3e3dacc84ab0eeda7e11bf88daa0e5c3b2994228dfef639d8fac2feafc701a7b61d28ffe045ee1d1084eab75b782c63
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5ea332fa0b34d358a487cd3577fd4e3c0
SHA158500d4b889dbc27f57a934d850f00649b3ab375
SHA2566663791caa8292759303ea63e70ce57de3a04f7b209d6b4acea138a27a145af2
SHA5124c4c4f01a5c41167c369b37ea6671f42ddaad7f2dfc04957ca2ba7adeabeeed3f6103736b04df777c939628b19583f77b3f8707b7be0223b3b47cafdeaf8743d