Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 02:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://wearedevs.net/d/JJSploit
Resource
win10v2004-20241007-en
General
-
Target
https://wearedevs.net/d/JJSploit
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 684 JJSploit_8.10.7_x64-setup.exe 684 JJSploit_8.10.7_x64-setup.exe 684 JJSploit_8.10.7_x64-setup.exe 684 JJSploit_8.10.7_x64-setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 64 raw.githubusercontent.com 65 raw.githubusercontent.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JJSploit_8.10.7_x64-setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 1660 msedge.exe 1660 msedge.exe 2384 identity_helper.exe 2384 identity_helper.exe 4736 msedge.exe 4736 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 4432 1660 msedge.exe 84 PID 1660 wrote to memory of 4432 1660 msedge.exe 84 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2976 1660 msedge.exe 85 PID 1660 wrote to memory of 2960 1660 msedge.exe 86 PID 1660 wrote to memory of 2960 1660 msedge.exe 86 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87 PID 1660 wrote to memory of 1252 1660 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://wearedevs.net/d/JJSploit1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff996cd46f8,0x7ff996cd4708,0x7ff996cd47182⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6916 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7176 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7152 /prefetch:82⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3943196430316024303,7985498395389052643,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\Temp1_JJSploit_8.10.7_x64-setup.nsis.zip\JJSploit_8.10.7_x64-setup.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_JJSploit_8.10.7_x64-setup.nsis.zip\JJSploit_8.10.7_x64-setup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:684
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x4641⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD532888238cfd9947834b3557ecbd9a0e6
SHA1a74f53bb5ec185caf4738d42b20a8897fae56b9d
SHA256317e11d43b27c9b999311ba81adc285016c6c9214073b36e9ce8f7e7f33e722d
SHA512094e3ddb2fcdb5d9c9ca869ee5f4f8d4c10423545612d4a0c9657a2871c6f054f3e3ec243c0c2d079a75948f415188e63c76453ffe0fd1c544cb4d597310cbf7
-
Filesize
1KB
MD5d798ac19d855dfc05673e4490e4d3029
SHA13d19a8f022633d23005cd0a0bfabb17d6f2ead89
SHA256ba1482d16e96958e5bfec9914cd18a6ad483216bf67e4774c09de7907840934f
SHA51238d7ee3a3d2f02a9e327e98f3af3008568daad838d772beffa014b18bff011f318fd1a8589fb93beb092895f95509d8533711abac5843364950347b688161b72
-
Filesize
6KB
MD5357844e65e7ceeb0a4073728d27aeed7
SHA1a5d7ee6c09e89f67ce698148a238d52908c8276a
SHA25652fe7bf77125dd899de4b65bce8cd2793aa5b5c97b1d50d271872c34a3225885
SHA512fa44748eef9e6a26fb839c0347a65a207d4cb2bba1be08f086f09469ffd6ff17afca546810db83ac534cbe434fbbe1891123c8db867319c0dd39965f06f26527
-
Filesize
7KB
MD594ac7db0603daad7bfb6f2831ceebc6c
SHA11f396d4b116b041606adf51a8cae38fdedd24ce8
SHA25616965651f6c32d1c1508d54007ef0b9c609d5cf83130b66e3b499c1258743f5f
SHA5121931352716d55b6f1364495b437f9c377ed3e543d04ddb314b5244cfbecefabfe7e4a36d12b0cd389069dc722c98fe77f9ae6462a13b2445626d4ec112cf5467
-
Filesize
8KB
MD59eae9cbc17bff70825a4963f6c835fce
SHA188dcbd0e57a2ef7c0e43301a729c9c13ae341659
SHA2560d7698b5a8da611991143ba37c771d2011a7501f910796961218c5979b501c6d
SHA5126381e68c07b7f574a3b531a0d26e69317a120c21b7de28f72de1c8e2ef5fb5b7705ebac1364853589bb28b72bbcb50ffe669a815843f9e4e490e44e569956e79
-
Filesize
7KB
MD554854c5339438beba223ce061ae52653
SHA13f3077dee08e38376ac5c5697c2434a7e38beb6f
SHA256f3cd4f5e8e9531bd1912a572318b620c2efe4f6a7ec5c787b287fbaec328240e
SHA51219ba6de4bfa2ba70070161091c41d682a2a164674f4112c627369d64568035a30048e20ea3ab5a914cd4b416ed7ad8bd6c597bde44f1e7e4a0ac5c9798d402bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5dd27be47c5f6387396f7dbc240d5c7e9
SHA1704f27e131ceec6bb574922b1839bbea7e525130
SHA256dd0805260dab91bf012f615e1a4164a147e9d24f738a878cbda708939720dedf
SHA512c48e7257b98326951e14d907dec93400e93a5f729795937e16f4f82823a6a9bd388c17a683c3ebc9d3eda064e1b7ec88c7907b958649c85984e89c3f69c4748d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5803c4.TMP
Filesize48B
MD5e51e268c3c732e33405f6862f5cd3b31
SHA1524c8ade8297bcb44a28f061289211ccaa63ffef
SHA256b02167cc802404c453ea863ad8d5ab80a627b1e5c9897ab20a725ae8a8a413ad
SHA512deca2db1939af6a038f43214e4f87d06604673be346b7a90de050fb8d0fa1920700d609afc3a7100b8ae39bfff686d35a417e599d8f70a19d28e337ba45a157c
-
Filesize
1KB
MD5c36fe9925c6e66bc5251e8cb727e536f
SHA17d021d29d22ebae87d57fdd308785537691c54a5
SHA256dd23b00e1ee31267489ea7b0fbe04f7a3e6af35bd5bb1ce620ea115fa0b3d6c9
SHA512d3382078626e3249aa5aaec3b2c5769f490e233331667786ba1773103bef905275bf1355f100ccb1288e9dcdb979264bfa70dc7fb2e881f7e3b5594572e287fd
-
Filesize
2KB
MD53e229e8cc684ab9b26d1b7668df940bb
SHA165755fefe4d79b58f9abab006118e75d127343a2
SHA2568397efe38d9b31bf2d938130e3f9941434934612c846f0c0ba2a1883f7147038
SHA5127ab2203cdd7a65f702b6943b2ab6449e1322c32a665620de1c2b2e2ee01e416b669d5fbd3f87909daeb5bb84996957ec1c0dce5275a80cfad5d6bf9bb6e283c4
-
Filesize
2KB
MD5a43667d19bf03b3a6809348689475644
SHA11416c04eb1cb018a42bb66a102a764c3ab0aab15
SHA2560d86261c3137b7ef95d71540eb02f8a5f0ae9f707f17a2e462dd58e82fbc4492
SHA5125abdb56958fa201e7b1dc67f3a609733ec0e1fe195bffc0f547e3944e32a63502833db22d05bdf06f1d643ff93b8d2bc407766ac94dd77ca2536f848d8988ca8
-
Filesize
1KB
MD59d448115af513f0e893544cd77d05fdb
SHA187fb440d7fc581e9b490b6111d4d12a50f153dec
SHA25683f5ad786ebb44bb20f8b4f5818676eaa4bda1331858519548f47cf9e47673c8
SHA512dba0ad5ac5786246ff6b3100282c57489355d2318c96864f6c23ab6b01ea0520967f67d03b18fe690262848bef30d8062a05a22f8d900fa01c35955880f5829d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f5282fbc-ade3-4cd6-95ef-c0666a4628a4.tmp
Filesize9KB
MD5d58287e289035a0029372a2fd1802cc6
SHA17002f422d106a0e6056966b442a42be47e9200a4
SHA256ce92c51fa1cfe66f743382aa12f07b456f4ed4ff326517d0057e474541d2cfb5
SHA51257c103315f3c0e8199d2334d1c40bc1ffded94cd6df3191d14d539f04ea71fe7aac822157322fad452bb6964dd83a8628a0626a87ec023f80190ca6cb6a3f670
-
Filesize
10KB
MD5a4b182989c230624aa4caaf91719495e
SHA19da972d45b60ea185b8eab2f42d7152f941c36e7
SHA256e10dcc60fe745f6ec6dd3eba2dfe404b46766fd204eef95225d5a446dd2a5560
SHA512e8e2e041244ddac4e12743a8ad6946be9a9473b1f91706d126ab00df7e3cfd926f5b273ca18c01f7754f3fdff0914b8633c2d1c17067f585cc8406a58eaf6e73
-
Filesize
10KB
MD52c376c17184baa6f70e50954bfcdcbbc
SHA1c0637527dab4b11525524e0f4de2dbea2c467667
SHA256be82843fe3621c8d49668d5a9205b35984968c1705f82d0e85f5a8bb209c87cd
SHA51247d28bca31fdbd3d737cb454dd11f84712849d3275ac4a39409406641b77309b2bcfddffd4f388040851a711478a73107f1b50a2158c4fb9433cc1508152e8f9
-
Filesize
15KB
MD5ee68463fed225c5c98d800bdbd205598
SHA1306364af624de3028e2078c4d8c234fa497bd723
SHA256419485a096bc7d95f872ed1b9b7b5c537231183d710363beee4d235bb79dbe04
SHA512b14fb74cb76b8f4e80fdd75b44adac3605883e2dcdb06b870811759d82fa2ec732cd63301f20a2168d7ad74510f62572818f90038f5116fe19c899eba68a5107
-
Filesize
7KB
MD5d070f3275df715bf3708beff2c6c307d
SHA193d3725801e07303e9727c4369e19fd139e69023
SHA25642dd4dda3249a94e32e20f76eaffae784a5475ed00c60ef0197c8a2c1ccd2fb7
SHA512fcaf625dac4684dad33d12e3a942b38489ecc90649eee885d823a932e70db63c1edb8614b9fa8904d1710e9b820e82c5a37aeb8403cf21cf1e3692f76438664d
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
Filesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
Filesize
5.7MB
MD58981cd26e588223069f3312444be6cc8
SHA1cce203a689135cc6a1c79c8c543be5839f7d43e0
SHA2564962e32eda2ccd7238948bf579c629a2e70c9bf5a029aa79abac01da119c4414
SHA5123fff093f1f41e84963495919eeb4a1fc43cead24e1ae12eb3d761a1865c28ec8ad20dd7a44b1eb8d4420dd22a5eaf7714a6727706fe2dfbfc6a10272ce20045e