Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
jXgJs3d.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
jXgJs3d.html
Resource
win10v2004-20240419-en
General
-
Target
jXgJs3d.html
-
Size
15KB
-
MD5
139fad7d7809546c8588b5899a355de9
-
SHA1
7ed673faea2fa48726085f24e9b08dc1dfa8d252
-
SHA256
a50ed0b8941d4cc4de739177df69eae79412f17221a984b11816395bc5d7bd3b
-
SHA512
b07b7bb34e0f2c642ed0216b8718a96b8cd0279dd92df0dbdc5fb1e0564dd63ffc667f2ee67b1e59366623ef0414f109c1cfcf60f833ea8ae7ea7179bfd79163
-
SSDEEP
192:PNx5Ssv99qXoqTJkNr423koT7p7juhU70nNZ9NewaH1IRy1N:5Ssl9qYoJkNc7y7BjuhnNewaHG8N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 684 msedge.exe 684 msedge.exe 3136 msedge.exe 3136 msedge.exe 2336 identity_helper.exe 2336 identity_helper.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4076 3136 msedge.exe 83 PID 3136 wrote to memory of 4076 3136 msedge.exe 83 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 1564 3136 msedge.exe 84 PID 3136 wrote to memory of 684 3136 msedge.exe 85 PID 3136 wrote to memory of 684 3136 msedge.exe 85 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86 PID 3136 wrote to memory of 3460 3136 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\jXgJs3d.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffa28a746f8,0x7ffa28a74708,0x7ffa28a747182⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,3666541337624488209,2592051399754006610,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
5KB
MD5e3f1b77f9d175a9860a6c709a4f88a68
SHA1219b144d019777fd1104bbe5687a1f5472b0d509
SHA2563541451dfc2a958751bee2cef6394b6ebc77b84e45c9a938f63daf6491f34147
SHA51295b0b7e0ffe4a45d7de5037303ca2aee8c53f007cb77cd73972a0bc984db2051e05e2c497f6482307e52e0d99f0aaead6070e84979a4071239dff5efb4c661d6
-
Filesize
6KB
MD573746a52810d4523ee7735fd06e9d179
SHA122d202a013a83f93d1242be27e9334902e71af95
SHA256350eec723149469f3a5bb2ba818e386bacfbbe9dfde4acf9b6c18a6b4677ac3b
SHA5123a2e6502c1245aa9dbaf846c9bf2480e936bbdfa03754c89bc88a8bb65ccf41bda6a90a88ba60cdaba2c581687fe2f9cec81d09b16535c8492d38f790456b291
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58aeeaffbddfb0a144d834a7f0752d5aa
SHA1b63696a7725be11362d244031fbeaf93946a64e6
SHA256812f7d201cfe2523ec5e66196ae517af19c9d6f76dfbab9ad002a7d92917698e
SHA51217f68445f72254f84e63279cb0f32284c3b583f0ec1b20174ac806b7f015bd8c308313d94cef3408c618ed6778f4f2a77e61d861706f31063d4ab43cd49815b1