Analysis
-
max time kernel
31s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-es -
resource tags
arch:x64arch:x86image:win10v2004-20240220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20-02-2024 13:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go-link.ru/mBYrb
Resource
win10v2004-20240220-es
General
-
Target
https://go-link.ru/mBYrb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 836 msedge.exe 836 msedge.exe 4728 msedge.exe 4728 msedge.exe 3904 identity_helper.exe 3904 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4728 wrote to memory of 4428 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 4428 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 640 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 836 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 836 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe PID 4728 wrote to memory of 2912 4728 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go-link.ru/mBYrb1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc244f46f8,0x7ffc244f4708,0x7ffc244f47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1556338576536542223,8798054723857541263,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD53300b8028991d6e234684db7803b66f9
SHA196df26150566233e1e0201bf17b4ea896861862e
SHA2565b7786b5ae4ba62b88bdbd0992a8fd96b37e4c7068e2fd23d0b33acf769d00cc
SHA5122f2dff4c24d4fd60160f70d544059bf02eca983309ff46bb7a1cb4d7c413e291c1520842e1922be55a4058380cd041cb6b4d9e70cdc5e4e00880fe13472df031
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a7f6a4b84d93993fde98d6553834416b
SHA14b4a227af10826f5a2f2e9b232ddb0336b3066f1
SHA256843a9671b3fab9337d8d600e170f9ac8b200a2faf63b5a8cd16f157bcf73c21d
SHA512ccfe39c47109dbf71c74ff6950526be7fcd521462f80e69e27388a9757d7f1adebf5f723c46b1631ffe3e2b4aa5829655d556bff8bd7e0f9f87fca46545bfb97
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD532f5ff1d9188c54ba41932af23c85705
SHA143ea89c84190d144fb1ca580ccffbf500cebfa91
SHA2560cd7f9cb5da1074ce2466f3252d3cdd6890df482f66455bc54ef37083542feb7
SHA51252b7001ce7d63e9dd7df6509dee6b970ff18819a60b67103d1329e4e52390c229c680168bc69b8d0075118fcc33bac99d7e2b51408e9bdc2f124fd4714ff95c6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5683a03b707851c84099b01426ea1c28f
SHA1f62c27ac1b46752ee116cf8cedeb7c0b98af2685
SHA2561cd10ac1781b7822dc40deca243d87bd9a8560e0ad9191fd85709dff2fb67924
SHA512d4f5184ffd8e30d9a2c2229dd258f68d5a442d494474f8ae78e632a38de99247589f70388050199109d48447aeb51dd58436fa659e7802892efdf1cbf56f786f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD54aa8d97a8680afc73f242cb00591b0f2
SHA1bbdbbaa43fae86498a366b91b299788ba78a1d2c
SHA256c4dbb705f52187bb76c1ae9dc8e89a1abd1f19efe7e64fcf334ac1ddc847a88b
SHA5127910a4136a4b1d85f05237f2da409a4c941d2ffcf5117ca6c7d81281e62d2967ec12e54fa7ffd41ee1efe6becfc31c426f2a832451f8ec85e2ade1429a32a75e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD56418c10c5c31f9c148f560a7a1fe7a02
SHA1fcd56f9c562474c15786170b1caab245b7c4ee3e
SHA256b7c56af0f39424475f3cba56ccd3773f13dfd8d89c5f94d7c33378b166d9db34
SHA5120a9fda15899d61a3570029c669654161e651779fd8fdadd2b3a737730f7dd7b4f646785459ffb3b6cc0c74696d74322bfa775a631e2f6ec7bc205a04b0f84727
-
\??\pipe\LOCAL\crashpad_4728_KBNQTTBPZYWXBXJXMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e