Overview
overview
10Static
static
10Xenium UI/...rm1.js
windows7-x64
3Xenium UI/...rm1.js
windows10-2004-x64
3Xenium UI/...m1.vbs
windows7-x64
1Xenium UI/...m1.vbs
windows10-2004-x64
1Xenium UI/...er.vbs
windows7-x64
1Xenium UI/...er.vbs
windows10-2004-x64
3Xenium UI/...es.vbs
windows7-x64
1Xenium UI/...es.vbs
windows10-2004-x64
1Xenium UI/...I2.dll
windows7-x64
1Xenium UI/...I2.dll
windows10-2004-x64
1Xenium UI/...o.html
windows7-x64
3Xenium UI/...o.html
windows10-2004-x64
3Xenium UI/...ain.js
windows7-x64
3Xenium UI/...ain.js
windows10-2004-x64
3Xenium UI/...bat.js
windows7-x64
3Xenium UI/...bat.js
windows10-2004-x64
3Xenium UI/...fee.js
windows7-x64
3Xenium UI/...fee.js
windows10-2004-x64
3Xenium UI/...cpp.js
windows7-x64
3Xenium UI/...cpp.js
windows10-2004-x64
3Xenium UI/...arp.js
windows7-x64
3Xenium UI/...arp.js
windows10-2004-x64
3Xenium UI/...csp.js
windows7-x64
3Xenium UI/...csp.js
windows10-2004-x64
3Xenium UI/...css.js
windows7-x64
3Xenium UI/...css.js
windows10-2004-x64
3Xenium UI/...ile.js
windows7-x64
3Xenium UI/...ile.js
windows10-2004-x64
3Xenium UI/...arp.js
windows7-x64
3Xenium UI/...arp.js
windows10-2004-x64
3Xenium UI/.../go.js
windows7-x64
3Xenium UI/.../go.js
windows10-2004-x64
3Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 01:17
Behavioral task
behavioral1
Sample
Xenium UI/executor ui/Form1.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Xenium UI/executor ui/Form1.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Xenium UI/executor ui/Form1.vbs
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Xenium UI/executor ui/Form1.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Xenium UI/executor ui/Properties/Resources.Designer.vbs
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Xenium UI/executor ui/Properties/Resources.Designer.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Xenium UI/executor ui/Properties/Resources.vbs
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Xenium UI/executor ui/Properties/Resources.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Xenium UI/executor ui/bin/Debug/Guna.UI2.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Xenium UI/executor ui/bin/Debug/Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Xenium UI/executor ui/bin/Debug/Monaco/Monaco.html
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Xenium UI/executor ui/bin/Debug/Monaco/Monaco.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/bat/bat.js
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/bat/bat.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/csp/csp.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/csp/csp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/css/css.js
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/css/css.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/dockerfile/dockerfile.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/fsharp/fsharp.js
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/fsharp/fsharp.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/go/go.js
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Xenium UI/executor ui/bin/Debug/Monaco/vs/basic-languages/go/go.js
Resource
win10v2004-20240802-en
General
-
Target
Xenium UI/executor ui/Properties/Resources.Designer.vbs
-
Size
3KB
-
MD5
d224c0c52422767ff6fbdaa86ce19d55
-
SHA1
6b741a090c4e1b1dad9b498138073b716e48abab
-
SHA256
267c2e705e546265cf0a08e78fa992ec5432325dee158b72f657c77b1be5f63f
-
SHA512
6de3f1dbadfcb977221563767530d8f7f466cbd70c20089b6670c9aa57ef996dd841b45b1e051cebc62a84eb639c4f4595c5aa6ec411af4145dda38e48c19057
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2456 1356 msedge.exe 98 PID 1356 wrote to memory of 2456 1356 msedge.exe 98 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 4704 1356 msedge.exe 99 PID 1356 wrote to memory of 2980 1356 msedge.exe 100 PID 1356 wrote to memory of 2980 1356 msedge.exe 100 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101 PID 1356 wrote to memory of 1960 1356 msedge.exe 101
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Xenium UI\executor ui\Properties\Resources.Designer.vbs"1⤵PID:1604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcc8d446f8,0x7ffcc8d44708,0x7ffcc8d447182⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,14334749180737055047,16783252152447693975,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,14334749180737055047,16783252152447693975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,14334749180737055047,16783252152447693975,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14334749180737055047,16783252152447693975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14334749180737055047,16783252152447693975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14334749180737055047,16783252152447693975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,14334749180737055047,16783252152447693975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:60
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
6KB
MD50f27bfde8def5f164e921d0061a01a48
SHA10f97e5c7334938dd397f7752021d69f66492fb7c
SHA2563dc8205c3dd6b4d076b60ef2ba25cfe4119685d6fbba41699b65184b57507bca
SHA512b70a33c1a7ccef18eb2b93d1485d521061d6613cb7614b76f8fae77a6a2dc00c92f6b7927061af23754a9fff3b61d6ca02cbaf05d125aeb083d63a55ab4d17de
-
Filesize
5KB
MD564c2b2393228ad05366eb80b78edd0b0
SHA1d9d37dfa2a22175be8d0510badaf45d59fc4e03f
SHA25617080a932c0123050f157450538da0b54ef935705df0da0fdb555e24eece8393
SHA512a0d3ce41c9fadfce9882b5a8b43774cae327efdfcd91d5728847fb3153a88babd0da34a56653fef5d034fbb10f45d3668f12c0e6e358b78f0c389868e0f205e2
-
Filesize
10KB
MD5138bdff25e2b1d693c6d6927ad61ce2f
SHA159e51336e70c58c0e34f0989834578f4347ba1de
SHA2564eb7cff21d24d47a69af18a697b3154c9dba6ffe5be657107a540c1688f29856
SHA5127dfa691c971d28f05c2b61cfbc6f0405fcb0a9c9bcee94e47c1b7dae58afe7ac4d34259cae11471a1430d5db95bd2848ec69ffc083b6bd4c05008deda149e9fd
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58