Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/08/2024, 14:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://jsn2024.blogspot.com
Resource
win11-20240802-en
General
-
Target
http://jsn2024.blogspot.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 5308 msedge.exe 5308 msedge.exe 5720 identity_helper.exe 5720 identity_helper.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 5952 2812 msedge.exe 81 PID 2812 wrote to memory of 5952 2812 msedge.exe 81 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 800 2812 msedge.exe 82 PID 2812 wrote to memory of 3068 2812 msedge.exe 83 PID 2812 wrote to memory of 3068 2812 msedge.exe 83 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84 PID 2812 wrote to memory of 5892 2812 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://jsn2024.blogspot.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaa90d3cb8,0x7ffaa90d3cc8,0x7ffaa90d3cd82⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,8205932000881743884,8936172257476537838,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52ee16858e751901224340cabb25e5704
SHA124e0d2d301f282fb8e492e9df0b36603b28477b2
SHA256e9784fcff01f83f4925f23e3a24bce63314ea503c2091f7309c014895fead33c
SHA512bd9994c2fb4bf097ce7ffea412a2bed97e3af386108ab6aab0df9472a92d4bd94489bb9c36750a92f9818fa3ea6d1756497f5364611e6ebd36de4cd14e9a0fba
-
Filesize
152B
MD5ea667b2dedf919487c556b97119cf88a
SHA10ee7b1da90be47cc31406f4dba755fd083a29762
SHA2569e7e47ebf490ba409eab3be0314fa695bf28f4764f4875c7568a54337f2df70f
SHA512832391afcac34fc6c949dee8120f2a5f83ca68c159ff707751d844b085c7496930f0c8fd8313fd8f10a5f5725138be651953934aa79b087ba3c6dd22eaa49c72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD53d4f80d46a6c45cccfe2bb1348bfbbaf
SHA1a7f74cebb2ecc990d19f513c5bc20fc069718242
SHA256e263bff54afd63412d66c7ef60c4a1a0ba6b4d61881da9e6f263627e9a98e5a0
SHA5123884dffd902de3433ec635e9229a56b1c1c2125a0e7edaf3f86339d697b17c4e48adae6f14830b0be12ee9e972665c5c6b885c880b0f97bafbd5ff325e31ef51
-
Filesize
1KB
MD5a2361b6491abaf60d1706e43d7dfac4f
SHA12f0e6b878cc462f2a10b4fefde92e3b55cf1f330
SHA256b1407d34ccae69d0cce619fb7f31a4c10c34500a0a83398a67376bb38f0370d2
SHA512261cd3192428d91b2b29227a09174b8322761f61b3ae6f415e6ea80e803a4e9b812582ee27d77ff327ad20bd09e47cf3c61e39607806845c9c56a5ee81a03dde
-
Filesize
5KB
MD5e1253de581bd8e552a6ed0705dac074e
SHA19d14cf5e80edbb1831de4a97a1295a9c56019b8a
SHA25658d8537a35e99f4f912f4f1c288e37bba1d6a320b219a4c7512c2c3811652ef8
SHA512af94f0c98a38c16f03342c2e9997e0d1ae4819fab679dcd1e8215885e59d9614b47fb98c5f410bc52091ef0935f122e7162d7762553def4acc3fcef301758f77
-
Filesize
6KB
MD57c9eaf71d8f17f46e88f4df6a3a319de
SHA1a353aee367e0dd926342bdf503b4b4f8160e7040
SHA2561f91c64d00a4d73b6f1d5daffdf84f0bc00dfd50e9665ca864b19662339fe019
SHA512822f2341a837e3c88496bfaf05a89b88a04d40203fdb25fd9b098335576a9d8fbbc939603ba43a4ac8f4d8e38a04cffd29afd876da1c81cbdba2fbca66eb4874
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e22b43f309c9b5bc653a3c4405eeb093
SHA1988a1a6eedf115d4976eba272fc2d82d51c52b8a
SHA2564eb727b41002e644bbcc208950126f3ac63ef0fa720e107d5b0d2fe88d383c48
SHA512faa261886169644f43e7565f9422530dbf26e10242aa5481ff085a8680c5d058c120350915185f2cd477a8e1b5c75f58b5957db9d08d9b21c5c7ed887ad4dfb7