Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/06/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
esx_scoreboard/html/listener.js
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
esx_scoreboard/html/scoreboard.html
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
esx_scoreboard/html/scoreboard1.html
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
esx_scoreboard/scan (1).bat
Resource
win11-20240426-en
Behavioral task
behavioral5
Sample
scan (1).bat
Resource
win11-20240426-en
General
-
Target
esx_scoreboard/html/scoreboard1.html
-
Size
1KB
-
MD5
4a02db94cd92aaa935b67fae6edb4f46
-
SHA1
c5d882e2028cc15ca9662074f1d4d48f03e9b1ba
-
SHA256
d2e3e8f1cadf322785ca8d171da8c0e2c691c417b7ae4d871a250d23d29d7d81
-
SHA512
8774f26942d2c8c8e7d1678d01f9465b9b62e7f1dd1d2a262b7b913184beaeafaad828695a968d97dd1c249d3a7486e2c809d937fcba2a61f84ce133f646d56e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 5028 msedge.exe 5028 msedge.exe 2312 msedge.exe 2312 msedge.exe 2068 identity_helper.exe 2068 identity_helper.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 1364 5028 msedge.exe 77 PID 5028 wrote to memory of 1364 5028 msedge.exe 77 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 4760 5028 msedge.exe 78 PID 5028 wrote to memory of 2000 5028 msedge.exe 79 PID 5028 wrote to memory of 2000 5028 msedge.exe 79 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80 PID 5028 wrote to memory of 4740 5028 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\esx_scoreboard\html\scoreboard1.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffecfb73cb8,0x7ffecfb73cc8,0x7ffecfb73cd82⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,10431891202898879482,14261550394806225833,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e027def9b55f3d49cde9fb82beba238
SHA164baabd8454c210162cbc3a90d6a2daaf87d856a
SHA2569816e980b04f1fe7efaa4b9c83ff6a0fdd485ee65a884c001b43a0cad7c39d83
SHA512a315e1336c5ec70cbb002969e539068ba92f3ec681b6d863db95227fd1808a778fd994e2fb03f28f0e401677aa5f7c66813e315b6b99a5065384c49586f9782e
-
Filesize
152B
MD50c5042350ee7871ccbfdc856bde96f3f
SHA190222f176bc96ec17d1bdad2d31bc994c000900c
SHA256b8b1cb139d4d19a85adce0152fa3c4f6adfb73a322d7253820e848c6f82afc1b
SHA5122efdb535fa6a06c4f9702b2129f2dd07c330e37fd10b492f2236007c660c1707773c22005d1e1fa580dbf633dc1a700ada3b7b611ef9accd9555a17a244f61ce
-
Filesize
675B
MD59d36f8a8da8d1778d271adc60cd6c237
SHA1a9b3a3e0a83ce15674006491c9a0dd07963e8aca
SHA256887bc5fd6786392d4b14492cdc44b167d872d65206eae3b6d01eb3ced6fbe515
SHA512688fb20209c5abf471c032a72e819ba459c2ffb3656d514f687d0af1b9d626067ae5b9e66aca0e0e61cfd3b0a184e85515e562babe48d78b80aa8c27b24c0691
-
Filesize
5KB
MD5cc7e81685634ef85417a307cbb66bd53
SHA1a98f3c34435440a836641e8413a4e860469066f8
SHA25639edbc7a7c4a9ffe7e6c11e80059c8470a05fb5c55bc0b3200f0128a554cc9a1
SHA51264ae5e5e63f4d7ee7423cdececf5c0c0f42d9b39d979654043d0c602b458b338e4eff5d01b54642238850c6211bcd9d2e03e81554e004d74a6e43998f1a4e9c3
-
Filesize
5KB
MD5eff77b0104cbeb68813deed798211196
SHA1e1b173fcbbe96ea473ad0e6bedfb4f9c739fb77d
SHA2563ba66adfdecad5e6d1e5a2f091e3fb343bb9d69f8a7fabe5fa373f8cef1373cb
SHA51278a661e6cb0f60acb253943715970c19147c028b29fc42f6fcebf8915323efcc36bfdcf4f8ff63141a43847bb6d7819a7134676b84eb1d5c8b5fcfc0d3245b86
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD517103a88e20e2b0fd91b05fc09df60ac
SHA17b5b670c5ceb078604da58bdc9b63d6767fc32ed
SHA25628c7bdd6235d0abf44a392dc1a7e9ef7ea0fe0bcdbe102a6d919dc4e8afd5eae
SHA5123528c89972e64c69e3d0018a9e0aceb79807ada5f0a222d7574987f1884a5bf514becaeb011ade4bc53cf878da9d4f12c8f77a100f5fa97af7168749a0ce411c