Overview
overview
10Static
static
3b7938b29a7...18.exe
windows7-x64
10b7938b29a7...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3152605369.html
windows7-x64
3152605369.html
windows10-2004-x64
31916524053.html
windows7-x64
31916524053.html
windows10-2004-x64
33072838935.html
windows7-x64
33072838935.html
windows10-2004-x64
332093631739.html
windows7-x64
332093631739.html
windows10-2004-x64
3910218026.html
windows7-x64
3910218026.html
windows10-2004-x64
3SuggestBox.js
windows7-x64
3SuggestBox.js
windows10-2004-x64
3Uninstaller.exe
windows7-x64
Uninstaller.exe
windows10-2004-x64
ads-the-in...d.html
windows7-x64
3ads-the-in...d.html
windows10-2004-x64
3locales308946821.html
windows7-x64
3locales308946821.html
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7938b29a73c948e483937740e10f679_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
152605369.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
152605369.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1916524053.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1916524053.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
3072838935.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
3072838935.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
32093631739.html
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
32093631739.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
910218026.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
910218026.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
SuggestBox.js
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
SuggestBox.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Uninstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
ads-the-internet-the-icon-revealed.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ads-the-internet-the-icon-revealed.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
locales308946821.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
locales308946821.html
Resource
win10v2004-20241007-en
General
-
Target
152605369.html
-
Size
16KB
-
MD5
db98bbd569a043527d8fc0b941704b15
-
SHA1
a076084247c4dd85be4578890167f270951366a8
-
SHA256
8cd22952b2d7f081e37b135b88443204cebe6a0f5671a0a034a94a5cfe9e9200
-
SHA512
049c1856b9863c35d8e662c89df69ca8c67b91e8c74b71d0bb388d8d9293d61ae6df3671ebe69065b498bf2b1ef21b66ba868652cdb3209624a13fc938d15347
-
SSDEEP
384:g/VA/V+qTyqSnq+0YVS/026zoxSJfA2rMMkauWv1ie17l+Wp6EW/6j6d6bqokBqP:g/6//kxtfoVi+0uA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3576 msedge.exe 3576 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3576 wrote to memory of 4204 3576 msedge.exe 83 PID 3576 wrote to memory of 4204 3576 msedge.exe 83 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 4572 3576 msedge.exe 84 PID 3576 wrote to memory of 3208 3576 msedge.exe 85 PID 3576 wrote to memory of 3208 3576 msedge.exe 85 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86 PID 3576 wrote to memory of 996 3576 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\152605369.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd426a46f8,0x7ffd426a4708,0x7ffd426a47182⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,8864421699769876667,5519684791987501170,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,8864421699769876667,5519684791987501170,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,8864421699769876667,5519684791987501170,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8864421699769876667,5519684791987501170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8864421699769876667,5519684791987501170,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,8864421699769876667,5519684791987501170,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
5KB
MD5866d9533265d1508dc604c12a5c2a31d
SHA12615c1b2ad91b8f3870155eabe2abe40460f763a
SHA25651dad943884809e19523a65873220b4d7d95c44211918d34b038eeddfe9247b4
SHA512010126291e276a08d73c2804bf2b3fb72df4c34b3d07c262533dffe912dc60233e3348ee5d0e81acaf28fa56bb02757db35f830b73282a877726d5b86e21a908
-
Filesize
6KB
MD58a91783d36853b76b2149e4b5801e813
SHA1a7785cc3ff7eddd19d3f5ddd8362ceb494415435
SHA25669e577f275c58f1674cb0189a8d8a63ebae4e02a322478020f29e12416b73cc3
SHA51298d08bbe9742c32b2650f36f59da9500e04f3665e8e70dee828e5676273ca19520f41a508fc4980f130fbf1c15b015a5696be3ed971102515d18c164d17891f9
-
Filesize
10KB
MD5237fae3d00023f4e81e414c7b98cbfb9
SHA14de6d204475a421281be4d1e94a4b81fbadd8a98
SHA256b5c072ace270bd5e9f68fa6faaeb5334ef1d5ee339e85162851ee43657281234
SHA512d0bac7dc72e78f96cc41d4cf9dc1e05d78f2e251b74d25da3488c852c585067f68a85a0af86fdc5e37a65f1452aa790cd6f1b07a471d5e5532c5f62a3c94eae5