Analysis
-
max time kernel
203s -
max time network
202s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/02/2024, 07:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://jazzfree.ya.com
Resource
win11-20240214-en
General
-
Target
http://jazzfree.ya.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 848 msedge.exe 848 msedge.exe 2872 msedge.exe 2872 msedge.exe 2904 identity_helper.exe 2904 identity_helper.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 1624 848 msedge.exe 74 PID 848 wrote to memory of 1624 848 msedge.exe 74 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 3108 848 msedge.exe 81 PID 848 wrote to memory of 4192 848 msedge.exe 80 PID 848 wrote to memory of 4192 848 msedge.exe 80 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83 PID 848 wrote to memory of 3684 848 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://jazzfree.ya.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff1b743cb8,0x7fff1b743cc8,0x7fff1b743cd82⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,9468315076575241169,3702566880705619369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cd0e8690afb6cc94da2feb0e0443dc81
SHA1ece9da10c445c54071e1224bb1dc25e8a15b089f
SHA25614d81c4f4672dd9503f4d137a36a107f1b662cff748a1edb15b53aabcec2074e
SHA512c04a5aa810668fc5549961c866e18ad6d3e7bc7cd252239713cc0dda77266267f008d3b452d4afb91695a2ff44c30eb727a8ffcbb38ce7e75085461f617ddf5e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5b564bec270168071b6b6224d133960b9
SHA170991240bfe3f4fc2ece2ad3255fc975897b0802
SHA25661556ae01f1db271e4a4490373364a2ea1a5f029c3408ec46810ccda14b85deb
SHA5123bde74769b3fd90a3c885cbb97d5831c61bf3fe76bab6bd371aa6212cfd6bac1ecafbe33fc0c8a7cd7972746f807a22ec6d2975c04154cf61c5eeefb40c3c991
-
Filesize
5KB
MD57a7283d26cf42c28549dc6a15bff8705
SHA19215385acdbe8525dce9eca19fc507a8d0452a73
SHA25670b32a7ba2f28c3a84ba46a0072143dd906ce5ab0869295e9e216b3ed290ad7a
SHA512d664a10e0df678ae57248330bd5b9e2ebd2ee2bea0591584b161848bb86d1092e3af336146235fa8f139bf0517badccfba16df57339e66be60ee973c4a829626
-
Filesize
5KB
MD5140f4964b34f22db5af22b54b8683ec4
SHA18b822e583dcd5a649fb95c201e0ca13b9594147d
SHA256324b9a55507d09929f6757557b973c47c6753e84d971eb89d717ebaae1d6d81a
SHA51291ee87aed5f8d5fcf55a95602b89eaabab639ec9d2e7b2f6a7390dcace58b14bbe1102849bf50e4e72f85c1c21b259beffd9dfb5c24e747483bbc86fba95288f
-
Filesize
25KB
MD5ee749e7f1e4889f30e18bcf8097ffcd5
SHA185630218fd3fccc00faaa4ad98595cbeefe0c026
SHA25669279ff724bf5c30735b79d0ed740d89a9fae97514bf98924e258d6bd1b24c12
SHA51260d13b2dda4d06b5150ccfa41b2b69eceaba6be608068546ac47cfe7e0a701736d097a5ef8b7614800b55efd273fe480f34f43d75e68e83573169b86e3a19284
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD541515e7fdb095bd51fddfe2235ae32ba
SHA1963fcd021a06354daebe3360a69db28d047148ad
SHA256fb1628a9e20644a3eb74dc846a00ce0149ed7a3cc815ab5c0bf5c623b44720cc
SHA51235a1065d2c8dc53a370bcd1050570ecf2ec3065955148f3a603be5b3f11444da209dd6d61ef874d29ce37463b94316c44a277eaf9d5c1bd172a9fc2b802e4bf4
-
Filesize
10KB
MD5e0a1b9603476dfb54f36f7ee2ceb04a3
SHA11e7eba04018471a6e741b1a6af59c26ba9765375
SHA256e7e9426cd06305bf3df379741a8f0536e30d831297fb316ccb7f261d76ca1209
SHA512011818fac9610a6739326c56729bb53c7819c125f90f95113cb6ec7a0c1030e0adc8c5000cdfa5ef6bf63dd59e7b1b2ffa6ffff56d5d00d28ab9d51daabe5bb4