Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wearedevs.net/dinfo/JJSploit
Resource
win10v2004-20240730-en
General
-
Target
https://wearedevs.net/dinfo/JJSploit
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1756 msedge.exe 1756 msedge.exe 1892 msedge.exe 1892 msedge.exe 2932 identity_helper.exe 2932 identity_helper.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe 1120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1892 wrote to memory of 3408 1892 msedge.exe 83 PID 1892 wrote to memory of 3408 1892 msedge.exe 83 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 4772 1892 msedge.exe 85 PID 1892 wrote to memory of 1756 1892 msedge.exe 86 PID 1892 wrote to memory of 1756 1892 msedge.exe 86 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87 PID 1892 wrote to memory of 436 1892 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://wearedevs.net/dinfo/JJSploit1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8efba46f8,0x7ff8efba4708,0x7ff8efba47182⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,11527429105623500229,11615480424433254516,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2188
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD523b6e2531d39ba76e0604a4685249f2d
SHA15f396f68bd58b4141a3a0927d0a93d5ef2c8172f
SHA2564a486d7be440ddf2909be2c2b41e55f0666b02670bbf077ac435e3cddc55a15e
SHA512a1a7fef086526e65184f60b61d483848183ef7c98cf09f05ac9e5b11504696406120ab01da8ed7f35e3145aa5fc54307c9397770681e4d10feea64113e7a57cd
-
Filesize
152B
MD56ffd468ded3255ce35ba13e5d87c985a
SHA109f11746553fd82f0a0ddef4994dc3605f39ccec
SHA25633103b1e4da1933459575d2e0441b8693ba1ede4695a3d924e2d74e72becabd8
SHA5125d5530c57faa4711f51e4baef0d1f556937a5db1e2a54ee376c3556c01db0ddf628856f346057d3849baa5db35603b96a0a9894f3c65a80c947085eb640348ee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5301949b34df513bea3dbe7e7a3087f5a
SHA1a396c72983b749a5e222bebdc4a88b9d0ee80f39
SHA256714e0ab9f21cd84fb9ab68d5b5d3be4a643c5dacb612a8946bd955ddb47d8450
SHA51258e4177fbc2481e680a5ed21e025b881047ec80d639ef7fd3f2532e059c703235a1d2fdd4327ef52e65f38e7bfac459abc89a87cd21536bfa597903812b56c0c
-
Filesize
2KB
MD51aadbe351fcc8a6e583d47d80781d5a5
SHA1c0dac94bddc6a91c61ee35aefecc762cbf0cab94
SHA25679e53e2812f7c730df5a3fc80c455f348381d65d39fd817bdcdbf1dcfa747070
SHA512ec580e41aae43537b61ec7da7649ddaacb6da342b444dd2f53c7ae20fb0172cb0e1f111e149e7cf6baf3b167a42c3df89e72bf8ff30befd74e3169aeeec3c531
-
Filesize
6KB
MD56c727fc547a652e93eafd100b56311ee
SHA19541c2cb64fb48c038944c86e829592f850ebe59
SHA2569710050eefcae5a85cd0d1a7699627442797c4c86b910669f4cb742ce4a67645
SHA5120a0501b7a625520e151f0e6b83c8896814ab41b455f6fb93b7ce6c950443f840a904c7f25e78c51706991cf5d991f88ee34b9f0b9a90be86c4b5d03514c27f53
-
Filesize
7KB
MD5544d08cda3c2a162f6081626c961cf0c
SHA1872a18f981b727d0986ec0ece3f172bbd053505a
SHA256db5ec39f118353931cbba5dc4bd937aedc7179e79a8ffb35aed30d8a58871039
SHA5123c72c08f7b26ba4b34b50080762a4c2e90e90b1f4e81cea9ed76053523001abea6e16122042766b0894064953a8b26c42f4e1aac966f5857477c08bdfe784630
-
Filesize
7KB
MD57ca6ceba61bca4595f3e929e4c94145c
SHA156f710d3c26552671605199706c2a7849bafe20b
SHA2567e38a2f2a8a45ca56a71a92c0e6b4787d9cf9bc60e601094575b76800ef0c8d8
SHA5126e95380639e7492dd4e1dafd709e69085a769c59c769bfc8961880dd198b2a3ac144827b070ab377ffea777e3f5088b057cb7fe0af8fb6ceaddcc2c64e6b50c4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5a218ada53bfa87eebe1ac68781137a81
SHA13b96631edc40917498a6297e8dcd87682b5fccf6
SHA256a144882b54a936b23384986465a97f9bd691d9d84b8e26c0a9e4171cd4ef5f6f
SHA512ad2e001f095dffc55c809092ad7a2f9f77689821ad2c73747f13f7b27c92a5b2933c552befb6ad5499af2b4771416cbc7083dd744cfba5227535a0b8e1282c72
-
Filesize
10KB
MD574492d5a10b29f88b279ddd1d8068609
SHA1bc83b7a3593581b9d7b2d3e0fc4c456fd6c8243d
SHA2565d106b6491ae835800d20d51980b400d0edd3a881dae2c7a22801a9fb6bd6bd9
SHA512da1666ac25353031a6141ad459c5c87328ce135af90348cf9f164ce66b5b63fa5ea375cbd012928b01872112fd575d59013fcc12b838d1d870dc5bcd7aa9e378