Analysis
-
max time kernel
41s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2023, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
gamesense.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
gamesense.exe
Resource
win10v2004-20230703-en
General
-
Target
gamesense.exe
-
Size
4.1MB
-
MD5
f666e382a97c3a195c7e4c935effb552
-
SHA1
7d70da6c8ba4b67b213313be5698804aa937465b
-
SHA256
a543359d824b86c38497b29069efe6fef54fcc01e4850fe182dec0cf16fb4193
-
SHA512
1246ec3955038e8ea78bcfbdac8dc851147e314cdfe35f157310de3a68087199615c0eee01b728607243aeb2ddc4bb507324b3688a899020d3ad08286d6d1c30
-
SSDEEP
49152:0ZYrVVl39jNdzhzlw0PhsLrrzaeTBUVhJyV9mzvAT9AJAzxlaSFsNqtFQxwatbjW:0ZInhpw0MOeT7/aYtF7
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2564 msedge.exe 2564 msedge.exe 3324 msedge.exe 3324 msedge.exe 540 identity_helper.exe 540 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 4916 3324 msedge.exe 91 PID 3324 wrote to memory of 4916 3324 msedge.exe 91 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 1164 3324 msedge.exe 92 PID 3324 wrote to memory of 2564 3324 msedge.exe 93 PID 3324 wrote to memory of 2564 3324 msedge.exe 93 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94 PID 3324 wrote to memory of 1388 3324 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\gamesense.exe"C:\Users\Admin\AppData\Local\Temp\gamesense.exe"1⤵PID:4332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffad48d46f8,0x7ffad48d4708,0x7ffad48d47182⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2768 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12146474794059913387,8089751316803208386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:1836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b5f5369274e3bfbc449588bbb57bd383
SHA158bb46d57bd70c1c0bcbad619353cbe185f34c3b
SHA2564190bd2ec2c0c65a2b8b97782cd3ae1d6cead80242f3595f06ebc6648c3e3464
SHA51204a3816af6c5a335cde99d97019a3f68ade65eba70e4667c4d7dd78f78910481549f1dad23a46ccf9efa2e25c6e7a7c78c592b6ace951e1aab106ba06a10fcd6
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD52795ce2b7def6ccd9974eb31f4250793
SHA1a9bf5994dffcbaa3c42e69c051e9fd788ea660e3
SHA25607cf81940e4498362dfacf714caf43c517cce647824acd91a0b5ffda127a7c60
SHA512a116e0d45a3648642a16bbeb90d42703ea275fa2fe6e958c141c0a8f37b94036b922d28727497eb0446d5cef1c38df050d3d82eb1c75af3ddaf77e9a5dd5353a
-
Filesize
5KB
MD51eda82a09840da4dfda96bd393ef2506
SHA16e23734ed8d66d8735983a12209b3b7d0f170d35
SHA256961aa166ef0fbc812784363a844c054490d81d5e2f42b5f38db8953c5043dd51
SHA51265f417f14d9933919b691a025cad491d2194356238e1dd78f156f1f182362ca86ef5acf3999f57d8f39e52a32f70fd15bad40fe849c53130e54ee06c90c06a48
-
Filesize
24KB
MD529213338df67d29d6454ee5d61ad3970
SHA18c69ca76a2e639060d5ce835a9600e6ea3764a83
SHA256d29fc0d97fa74d382d0f557ecea4e42b7d50dbce43915bfc0c114c16e532aa51
SHA51214db25eba8a863d390b97fce4315402ed7c249598ff6c31d5a191b0f71c274eead42ba0658403e744110de072e6ff1cac3bccee1e48875bde6b1fe39a60d2407
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5b1794b527737d3a8c5eb1c284f61a136
SHA15726cdddd601ccf9c320b2cf4fe6c24c687337af
SHA2567a326fae5d7d3775eb305cd9e777041a564fa46d8b057c74a46c7b45a5eb0ee4
SHA5125536f8ca64cf635527f7bf7a816ee0660a5ef1d2f57d467b5787b383d99c29ae4ab8814cdf3535f5a889683a8e6995188f5eeec7bf424a2445d6d8691b12770a