URL:

https://wearedevs.net/d/jjsploit

Full analysis: https://app.any.run/tasks/7e6c870a-42e1-41a9-a474-b7d85ec78be9
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 14, 2024, 14:38:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

C3ED6403FEA9F2F9DC8E86C412CB3334

SHA1:

A3CB61C057D39E1CC76B888C3CADAB5E275C065C

SHA256:

59C4ED340EE1B0F9A7136E9680FF6DD4512E5EE4324112DB9BC744ADAF24A069

SSDEEP:

3:N8R/BApK8K:25BuBK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 292)
    • Changes the autorun value in the registry

      • MicrosoftEdgeUpdate.exe (PID: 2728)
    • Drops the executable file immediately after the start

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • powershell.exe (PID: 292)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
    • Scans artifacts that could help determine the target

      • msedgewebview2.exe (PID: 2616)
    • The DLL Hijacking

      • msedgewebview2.exe (PID: 2148)
      • msedgewebview2.exe (PID: 3444)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 3152)
    • Reads the Internet Settings

      • powershell.exe (PID: 292)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • cmd.exe (PID: 3600)
      • cmd.exe (PID: 3596)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
      • cmd.exe (PID: 3788)
      • cmd.exe (PID: 1848)
      • cmd.exe (PID: 1288)
      • JJSploit.exe (PID: 3068)
      • cmd.exe (PID: 2828)
    • Process drops legitimate windows executable

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • powershell.exe (PID: 292)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
    • Executable content was dropped or overwritten

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
    • Starts itself from another location

      • MicrosoftEdgeUpdate.exe (PID: 2728)
    • Creates/Modifies COM task schedule object

      • MicrosoftEdgeUpdate.exe (PID: 124)
    • Reads settings of System Certificates

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
      • JJSploit.exe (PID: 3068)
    • Checks Windows Trust Settings

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 292)
    • Reads security settings of Internet Explorer

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
    • Unusual connection from system programs

      • powershell.exe (PID: 292)
    • Starts CMD.EXE for commands execution

      • JJSploit.exe (PID: 3376)
      • JJSploit.exe (PID: 3068)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 292)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeUpdate.exe (PID: 2728)
    • Creates a software uninstall entry

      • setup.exe (PID: 1348)
    • Searches for installed software

      • setup.exe (PID: 1348)
      • msedgewebview2.exe (PID: 2616)
    • Application launched itself

      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • msedgewebview2.exe (PID: 2616)
    • Adds/modifies Windows certificates

      • JJSploit.exe (PID: 3068)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 1692)
      • firefox.exe (PID: 1836)
      • msedge.exe (PID: 4016)
      • msedge.exe (PID: 2980)
      • msedge.exe (PID: 3872)
      • msedge.exe (PID: 2920)
      • msedge.exe (PID: 2020)
      • msedge.exe (PID: 3148)
    • The process uses the downloaded file

      • firefox.exe (PID: 1692)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3812)
    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 3812)
    • Manual execution by a user

      • msiexec.exe (PID: 3812)
      • JJSploit.exe (PID: 3376)
      • JJSploit.exe (PID: 3608)
      • JJSploit.exe (PID: 2884)
      • JJSploit.exe (PID: 996)
      • JJSploit.exe (PID: 2972)
      • JJSploit.exe (PID: 3740)
      • JJSploit.exe (PID: 3416)
      • JJSploit.exe (PID: 2064)
      • JJSploit.exe (PID: 3876)
      • JJSploit.exe (PID: 2316)
      • JJSploit.exe (PID: 3480)
      • JJSploit.exe (PID: 3068)
    • Creates files or folders in the user directory

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • msedgewebview2.exe (PID: 880)
      • msedgewebview2.exe (PID: 2616)
      • msedgewebview2.exe (PID: 2360)
    • Create files in a temporary directory

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
    • Reads the computer name

      • MicrosoftEdgeUpdate.exe (PID: 124)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 1556)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • JJSploit.exe (PID: 3376)
      • JJSploit.exe (PID: 2884)
      • JJSploit.exe (PID: 3608)
      • JJSploit.exe (PID: 2972)
      • JJSploit.exe (PID: 3416)
      • JJSploit.exe (PID: 996)
      • JJSploit.exe (PID: 2316)
      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • JJSploit.exe (PID: 3740)
      • JJSploit.exe (PID: 2064)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • setup.exe (PID: 1348)
      • JJSploit.exe (PID: 3876)
      • JJSploit.exe (PID: 3480)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • JJSploit.exe (PID: 3068)
      • msedgewebview2.exe (PID: 2616)
      • msedgewebview2.exe (PID: 2360)
      • msedgewebview2.exe (PID: 3444)
      • msedgewebview2.exe (PID: 2148)
    • Checks supported languages

      • MicrosoftEdgeUpdate.exe (PID: 124)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 1556)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • JJSploit.exe (PID: 3376)
      • JJSploit.exe (PID: 3608)
      • JJSploit.exe (PID: 2884)
      • JJSploit.exe (PID: 996)
      • JJSploit.exe (PID: 3740)
      • JJSploit.exe (PID: 3416)
      • JJSploit.exe (PID: 2972)
      • JJSploit.exe (PID: 2064)
      • JJSploit.exe (PID: 3876)
      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • JJSploit.exe (PID: 2316)
      • MicrosoftEdge_X86_109.0.1518.140.exe (PID: 1192)
      • JJSploit.exe (PID: 3480)
      • setup.exe (PID: 1348)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 548)
      • msedgewebview2.exe (PID: 3444)
      • msedgewebview2.exe (PID: 2360)
      • JJSploit.exe (PID: 3068)
      • msedgewebview2.exe (PID: 2616)
      • msedgewebview2.exe (PID: 880)
      • msedgewebview2.exe (PID: 2148)
      • msedgewebview2.exe (PID: 3616)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
    • Reads the machine GUID from the registry

      • MicrosoftEdgeUpdate.exe (PID: 2728)
      • MicrosoftEdgeUpdate.exe (PID: 1556)
      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
      • JJSploit.exe (PID: 3068)
    • Checks proxy server information

      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • JJSploit.exe (PID: 3068)
    • Reads the software policy settings

      • MicrosoftEdgeUpdate.exe (PID: 2868)
      • MicrosoftEdgeUpdate.exe (PID: 1848)
      • MicrosoftEdgeUpdate.exe (PID: 3752)
      • msedgewebview2.exe (PID: 2616)
      • JJSploit.exe (PID: 3068)
    • Process checks computer location settings

      • msedgewebview2.exe (PID: 2616)
      • msedgewebview2.exe (PID: 3616)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
175
Monitored processes
125
Malicious processes
11
Suspicious processes
1

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs msiexec.exe vssvc.exe no specs powershell.exe microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe microsoftedgeupdate.exe no specs microsoftedgeupdate.exe jjsploit.exe cmd.exe no specs cmd.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe jjsploit.exe microsoftedge_x86_109.0.1518.140.exe setup.exe microsoftedgeupdate.exe jjsploit.exe msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs msedgewebview2.exe no specs cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs msedge.exe msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1556 --field-trial-handle=1180,i,6433191679639864184,16340997149056799153,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
124"C:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserverC:\Users\admin\AppData\Local\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exeMicrosoftEdgeUpdate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge Update
Exit code:
0
Version:
1.3.185.29
Modules
Images
c:\users\admin\appdata\local\microsoft\edgeupdate\microsoftedgeupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
292powershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -WaitC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
296"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2880 --field-trial-handle=1444,i,6909561473689785412,2970562265441856545,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
324"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xdc,0x6861f598,0x6861f5a8,0x6861f5b4C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
324"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5184 --field-trial-handle=1304,i,2375966597474364023,4006469782731593580,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
548"C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=JJSploit.exe --webview-exe-version=7.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1536 --field-trial-handle=1204,i,159669723322593920,3439710655358089208,131072 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8C:\Users\admin\AppData\Local\Microsoft\EdgeWebView\Application\109.0.1518.140\msedgewebview2.exemsedgewebview2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge WebView2
Exit code:
0
Version:
109.0.1518.140
Modules
Images
c:\users\admin\appdata\local\microsoft\edgewebview\application\109.0.1518.140\msedgewebview2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\microsoft\edgewebview\application\109.0.1518.140\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
552"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1692.6.668826339\2016781818" -childID 5 -isForBrowser -prefsHandle 3600 -prefMapHandle 3948 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 916 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e437b3c-edfb-4a69-9ef3-1823ed7fabc5} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" 3964 217b3e00 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
696"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1692.1.1171771633\1506723503" -parentBuildID 20230710165010 -prefsHandle 1408 -prefMapHandle 1404 -prefsLen 28600 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {97df33df-5c35-4e54-a024-69cf635f8d8a} 1692 "\\.\pipe\gecko-crash-server-pipe.1692" 1420 15e27900 socketC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
848"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1460 --field-trial-handle=1308,i,13343829578652645794,12877555056413543586,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
99 993
Read events
96 144
Write events
3 710
Delete events
139

Modification events

(PID) Process:(1836) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
92405C5101000000
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
5DC35D5101000000
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Installer\308046B0AF4A39CB
Operation:delete valueName:installer.taskbarpin.win10.enabled
Value:
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Theme
Value:
1
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Enabled
Value:
1
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(1692) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SetDefaultBrowserUserChoice
Value:
1
Executable files
107
Suspicious files
440
Text files
332
Unknown types
120

Dropped files

PID
Process
Filename
Type
1692firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmpbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.jsonbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:
SHA256:
1692firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shmbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
40
TCP/UDP connections
239
DNS requests
329
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1692
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
unknown
1692
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
unknown
1692
firefox.exe
POST
200
92.123.106.51:80
http://r3.o.lencr.org/
unknown
unknown
1692
firefox.exe
POST
200
142.250.181.227:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
1692
firefox.exe
POST
200
92.123.106.51:80
http://r3.o.lencr.org/
unknown
unknown
1692
firefox.exe
POST
200
92.123.106.51:80
http://r3.o.lencr.org/
unknown
unknown
1692
firefox.exe
POST
200
142.250.181.227:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
1692
firefox.exe
POST
200
142.250.181.227:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
1692
firefox.exe
POST
142.250.181.227:80
http://ocsp.pki.goog/gts1c3
unknown
unknown
1692
firefox.exe
POST
92.123.106.51:80
http://r3.o.lencr.org/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1692
firefox.exe
104.26.6.147:443
wearedevs.net
CLOUDFLARENET
US
unknown
1692
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
1692
firefox.exe
34.117.237.239:443
contile.services.mozilla.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1692
firefox.exe
34.117.188.166:443
spocs.getpocket.com
GOOGLE-CLOUD-PLATFORM
US
unknown
1692
firefox.exe
34.149.100.209:443
firefox.settings.services.mozilla.com
GOOGLE
US
unknown
1692
firefox.exe
92.123.106.51:80
r3.o.lencr.org
TELECOM ITALIA SPARKLE S.p.A.
IT
unknown
1692
firefox.exe
172.217.16.202:443
safebrowsing.googleapis.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
wearedevs.net
  • 104.26.6.147
  • 172.67.71.2
  • 104.26.7.147
  • 2606:4700:20::ac43:4702
  • 2606:4700:20::681a:793
  • 2606:4700:20::681a:693
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.117.237.239
whitelisted
spocs.getpocket.com
  • 34.117.188.166
shared
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
prod.ads.prod.webservices.mozgcp.net
  • 34.117.188.166
unknown
firefox.settings.services.mozilla.com
  • 34.149.100.209
whitelisted
prod.remote-settings.prod.webservices.mozgcp.net
  • 34.149.100.209
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
JJSploit.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.