Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
703d51b3aeb16c0149b1798e1f6701ec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
703d51b3aeb16c0149b1798e1f6701ec.exe
Resource
win10v2004-20231215-en
General
-
Target
703d51b3aeb16c0149b1798e1f6701ec.exe
-
Size
3.6MB
-
MD5
703d51b3aeb16c0149b1798e1f6701ec
-
SHA1
c9dba44c975e5adc6c692d6a0e8f2be9775c51e4
-
SHA256
87d6224decdba5622eadd30ceca31465fffbb003f2c9331f6d918405e8cf866d
-
SHA512
629ba5743213c5d224bea53e41f1b38c3ca5a32c7a066ad6109acc715067bab588bcc177001914484163c46bdf1e22c60528549348c1b2337b37a366e931aab8
-
SSDEEP
98304:7f2OcniLbQMqHRyHQw3GT3q7Lm3yZ4vFADmXSZfWE5RyryfsFB:z2OcvpHRE7Lmq4tADmXfiQr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1716 703d51b3aeb16c0149b1798e1f6701ec.tmp 4744 Xinfeng_Jxc10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1716 703d51b3aeb16c0149b1798e1f6701ec.tmp 1716 703d51b3aeb16c0149b1798e1f6701ec.tmp 3512 msedge.exe 3512 msedge.exe 3716 msedge.exe 3716 msedge.exe 1508 identity_helper.exe 1508 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1716 703d51b3aeb16c0149b1798e1f6701ec.tmp 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4744 Xinfeng_Jxc10.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3360 wrote to memory of 1716 3360 703d51b3aeb16c0149b1798e1f6701ec.exe 89 PID 3360 wrote to memory of 1716 3360 703d51b3aeb16c0149b1798e1f6701ec.exe 89 PID 3360 wrote to memory of 1716 3360 703d51b3aeb16c0149b1798e1f6701ec.exe 89 PID 1716 wrote to memory of 4744 1716 703d51b3aeb16c0149b1798e1f6701ec.tmp 90 PID 1716 wrote to memory of 4744 1716 703d51b3aeb16c0149b1798e1f6701ec.tmp 90 PID 1716 wrote to memory of 4744 1716 703d51b3aeb16c0149b1798e1f6701ec.tmp 90 PID 4744 wrote to memory of 3716 4744 Xinfeng_Jxc10.exe 99 PID 4744 wrote to memory of 3716 4744 Xinfeng_Jxc10.exe 99 PID 3716 wrote to memory of 1780 3716 msedge.exe 100 PID 3716 wrote to memory of 1780 3716 msedge.exe 100 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 4936 3716 msedge.exe 101 PID 3716 wrote to memory of 3512 3716 msedge.exe 102 PID 3716 wrote to memory of 3512 3716 msedge.exe 102 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103 PID 3716 wrote to memory of 2668 3716 msedge.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\703d51b3aeb16c0149b1798e1f6701ec.exe"C:\Users\Admin\AppData\Local\Temp\703d51b3aeb16c0149b1798e1f6701ec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\is-GHJF4.tmp\703d51b3aeb16c0149b1798e1f6701ec.tmp"C:\Users\Admin\AppData\Local\Temp\is-GHJF4.tmp\703d51b3aeb16c0149b1798e1f6701ec.tmp" /SL5="$10020E,3561498,79360,C:\Users\Admin\AppData\Local\Temp\703d51b3aeb16c0149b1798e1f6701ec.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Xinfeng_Jxc10.exe"C:\Users\Admin\AppData\Local\Temp\Xinfeng_Jxc10.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://down.63733.com/Xinfeng_Rundll.zip4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d1fc46f8,0x7ff8d1fc4708,0x7ff8d1fc47185⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:25⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:85⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:15⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:15⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 /prefetch:85⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:15⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:15⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:15⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:15⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:15⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:15⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,912944641060652948,8079312863941523658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:15⤵PID:4588
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD53ac81d1737b915f141671e68aa0f1371
SHA153c9a45eb7c5c99dda75352ac989ee036ec51ab2
SHA256d122a3307d5bb7dc6b745461cb10cf1cb8665485d2d31b0662f90292037214c1
SHA512f0b27a4d3cfbc03f13a9bd8a6d2f70383178a9f1fcd291fa82142e9439538adc0b21e63ff291362ec1b4872ae8495e595181077c930b486dd360bce859d0dd9f
-
Filesize
5KB
MD585df56018d100118d7f7c486ffdf92c2
SHA196966702382abcd5b85c12416a39c7a68b337408
SHA2562ebc572badd275000d1ba6320c26f299347af28d562ac36fd4750dec0419a64f
SHA51254be2d82b4eb7c77a9ca4b3b4b8ff9ac869484d847480ad9f42723c3e68a139d4b0f5515b3519a52fde47316d2e218316898e38e5e4212b5580c78fff6287d6b
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD588edca67aa5c62a3abd12c949483f70b
SHA129784fcbebcb12900147207d05ec5628a11bc5ea
SHA256fc9f84d790264a2ac32b84852acd319686fec7a0b44a5178814e74416f55cec4
SHA51263c614ea029ae5d2bce554ce3f06ebca8edb1d74aa9e3fc8f0aba9806a2e0977b77238d3de41e7856bcf0349287722517453b3654f156003af773058f346e869
-
Filesize
11.6MB
MD5ed333b1c6c45420c0861ea6a017453c7
SHA12c7ba41d85d2e67ddfe6f7634a3dfe38590286f5
SHA25613d24576b154598a6f2755c6ae1fd9c88211e5fbfb93f9755b8a61b7e53323c0
SHA51230596f209c88946161f8157bb9790cc16c1a301fbefe1e4047f39874a0eff1f987c5babbd759543c795d3e42c715722ff4163728f1cfe34edbb4672242b5b173
-
Filesize
726KB
MD5802d4cf2ece96437fded0e138bafa605
SHA1fc132e4884690782cf2c53929b684895fb0b825b
SHA2562a195b66a7e13aa47daf6d621dde5610d6765007cb5adcfc35b4037e0ea010a0
SHA512c2778cae893c9dadae8d19c2229558b2f56fd57816a8fd92e780ed2e67fc0ae700a65680aee16c7c52906a2d7dd11a9af402a819492602cf2d11f697a0ea90b0