Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go-link.ru/P2YXa
Resource
win10v2004-20240221-en
General
-
Target
https://go-link.ru/P2YXa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4224 msedge.exe 4224 msedge.exe 2920 msedge.exe 2920 msedge.exe 4536 identity_helper.exe 4536 identity_helper.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2920 wrote to memory of 3752 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3752 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4720 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4224 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 4224 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe PID 2920 wrote to memory of 3204 2920 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go-link.ru/P2YXa1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9004d46f8,0x7ff9004d4708,0x7ff9004d47182⤵PID:3752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2360 /prefetch:22⤵PID:4720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3056 /prefetch:82⤵PID:3204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:4396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4016
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4236
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:2632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:12⤵PID:2712
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,1380172839856635862,238236577984741622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5360dd5debf8bf7b89c4d88d29e38446c
SHA165afff8c78aeb12c577a523cb77cd58d401b0f82
SHA2563d9debe659077c04b288107244a22f1b315bcf7495bee75151a9077e71b41eef
SHA5120ee5b81f0acc82befa24a4438f2ca417ae6fac43fa8c7f264b83b4c792b1bb8d4cecb94c6cbd6facc120dc10d7e4d67e014cdb6b4db83b1a1b60144bb78f7542
-
Filesize
152B
MD56fbbaffc5a50295d007ab405b0885ab5
SHA1518e87df81db1dded184c3e4e3f129cca15baba1
SHA256b9cde79357b550b171f70630fa94754ca2dcd6228b94f311aefe2a7f1ccfc7b6
SHA512011c69bf56eb40e7ac5d201c1a0542878d9b32495e94d28c2f3b480772aa541bfd492a9959957d71e66f27b3e8b1a3c13b91f4a21756a9b8263281fd509c007b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD526d3743a6c9362d15db593724687861a
SHA164eaf3e8fd6734ffb5018863deba449b75b6b364
SHA25643fa70d1fbc21db78d2b726e0fb9fbd6b3540cb1e8c17414ae721f452f572254
SHA512f5718efe9c79d87efae0ff80ca4806e4a4a961fdd26913d62c23b82a7c30f35b92b6a04c5b8e01254dffc89be6978c52327dee15c5563178311f267a8c749d9f
-
Filesize
857B
MD5148b71ed33b7fd463f926d01c5be33be
SHA120f56a6f1c428231d752554f174d5297e213c4bd
SHA25632663c9f4180e7c56709a4ac24b26e45bc45d147778e37e641812f2461ee5072
SHA512f810aecf686ce812baee7a0eaf748ce3b41b44ddfe77b0e6ffe23d908ac5485618805a38f145c7eefac3666583c1be67d3811821d69445f85f2ef91e611eb6c2
-
Filesize
6KB
MD5d350f0a77e5e85f898d9b485188d370c
SHA142ca1cbf0458d95ae9c4721b4845f6b1b99729fa
SHA256b6dc928adbbf851a06814d49f3c79fb70d432fbe7619aa13c6239553c04337f3
SHA51213fce9a239877c7a6a42673bf9bcc801820525c1ec781f1736a70ffea02f01903c38f53d359ff874c0dbc116385c640dc3be6de953de6a0a238e8da6bcf9432d
-
Filesize
6KB
MD5c030111783100f7511aa283dada5b778
SHA18211a6a87aab03f7d46903caa990235aa2b918cc
SHA256c4ce7e57970b97fe11561a09c2749d4c1014ccce781c341cd749ae9f697c4798
SHA5124cf0c1459e18c49fbc08680ddec8586b3488b7de8f413f2106d0265acd35406b5df06b1a226e43b2de015933f7fdc464dc1d384ee0967987fbdbf9d2b7fc09fd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bcd1fadd30b7c1f486d03f4300b73635
SHA1f5aa9bdc29e09f9530915557f23c5ce6d385b21d
SHA256b95ef9d47928e2b43edf06c721416cd50a22540c3e1b353401df569e434f2c09
SHA51299b93158e02bbd074c33930faf39dcc045d6b70cbdb6f856d8f8a1e82b6b4f2b7d88d1eb2d6cabbb85b4987686059ff82b5ffc3d8fe9961afced798f62f72a68
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e