Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 21:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1211065081018978314/1211067374950809700/Gold_Loader_Fix_for_Failed_to_Manual_Map.exe?ex=65ecd962&is=65da6462&hm=e479038f7b337707a00c24e5082fa1fb3938e129f22bc5481b607184abceee2f&
Resource
win10v2004-20240221-en
General
-
Target
https://cdn.discordapp.com/attachments/1211065081018978314/1211067374950809700/Gold_Loader_Fix_for_Failed_to_Manual_Map.exe?ex=65ecd962&is=65da6462&hm=e479038f7b337707a00c24e5082fa1fb3938e129f22bc5481b607184abceee2f&
Malware Config
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0002000000022778-34.dat family_xworm behavioral1/memory/4516-67-0x0000000000B40000-0x0000000000BBC000-memory.dmp family_xworm -
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral1/files/0x0002000000022778-34.dat family_zgrat_v1 behavioral1/memory/4516-67-0x0000000000B40000-0x0000000000BBC000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x0002000000022778-34.dat net_reactor behavioral1/memory/4516-67-0x0000000000B40000-0x0000000000BBC000-memory.dmp net_reactor behavioral1/memory/2072-260-0x00000000024B0000-0x00000000024C0000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\Control Panel\International\Geo\Nation Gold_Loader_Fix_for_Failed_to_Manual_Map.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Gold_Loader_Fix_for_Failed_to_Manual_Map.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Gold_Loader_Fix_for_Failed_to_Manual_Map.exe -
Executes dropped EXE 11 IoCs
pid Process 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 5636 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 5708 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 6088 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4300 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 5504 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 5096 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 2072 XClient.exe 1648 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4528 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 5324 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" Gold_Loader_Fix_for_Failed_to_Manual_Map.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 66 4.tcp.eu.ngrok.io 84 4.tcp.eu.ngrok.io 88 4.tcp.eu.ngrok.io -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 49 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5984 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1414748551-1520717498-2956787782-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 893931.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4420 msedge.exe 4420 msedge.exe 2476 identity_helper.exe 2476 identity_helper.exe 4464 msedge.exe 4464 msedge.exe 2812 powershell.exe 2812 powershell.exe 2812 powershell.exe 5216 powershell.exe 5216 powershell.exe 5216 powershell.exe 5436 powershell.exe 5436 powershell.exe 5436 powershell.exe 5608 powershell.exe 5608 powershell.exe 5608 powershell.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe 4652 msedge.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 5216 powershell.exe Token: SeDebugPrivilege 5436 powershell.exe Token: SeDebugPrivilege 5608 powershell.exe Token: SeDebugPrivilege 5636 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 5708 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 6088 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 4300 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 5504 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 5096 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 552 taskmgr.exe Token: SeSystemProfilePrivilege 552 taskmgr.exe Token: SeCreateGlobalPrivilege 552 taskmgr.exe Token: SeDebugPrivilege 2072 XClient.exe Token: 33 552 taskmgr.exe Token: SeIncBasePriorityPrivilege 552 taskmgr.exe Token: SeDebugPrivilege 1648 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 4528 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe Token: SeDebugPrivilege 5324 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe -
Suspicious use of SendNotifyMessage 53 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe 552 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4516 Gold_Loader_Fix_for_Failed_to_Manual_Map.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2560 4420 msedge.exe 48 PID 4420 wrote to memory of 2560 4420 msedge.exe 48 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4720 4420 msedge.exe 88 PID 4420 wrote to memory of 4684 4420 msedge.exe 87 PID 4420 wrote to memory of 4684 4420 msedge.exe 87 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 PID 4420 wrote to memory of 4976 4420 msedge.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1211065081018978314/1211067374950809700/Gold_Loader_Fix_for_Failed_to_Manual_Map.exe?ex=65ecd962&is=65da6462&hm=e479038f7b337707a00c24e5082fa1fb3938e129f22bc5481b607184abceee2f&1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac96c46f8,0x7ffac96c4708,0x7ffac96c47182⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4208 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Gold_Loader_Fix_for_Failed_to_Manual_Map.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5216
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5608
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"3⤵
- Creates scheduled task(s)
PID:5984
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4500
-
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5636
-
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5708
-
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:6028
-
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14590814959636889155,10485531802249940380,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:616
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5504
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:552
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"C:\Users\Admin\Downloads\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Gold_Loader_Fix_for_Failed_to_Manual_Map.exe.log
Filesize654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD51f6d41bf10dc1ec1ca4e14d350bbc0b1
SHA17a62b23dc3c19e16930b5108d209c4ec937d7dfb
SHA25635947f71e9cd4bda79e78d028d025dff5fe99c07ea9c767e487ca45d33a5c770
SHA512046d6c2193a89f4b1b7f932730a0fc72e9fc95fbdb5514435a3e2a73415a105e4f6fa7d536ae6b24638a6aa97beb5c8777e03f597bb4bc928fa8b364b7192a13
-
Filesize
152B
MD54254f7a8438af12de575e00b22651d6c
SHA1a3c7bde09221129451a7bb42c1707f64b178e573
SHA2567f55f63c6b77511999eee973415c1f313f81bc0533a36b041820dd4e84f9879b
SHA512e6a3244139cd6e09cef7dab531bff674847c7ca77218bd1f971aa9bf733a253ac311571b8d6a3fe13e13da4f506fec413f3b345a3429e09d7ceb821a7017ec70
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD5df20c4438fc0020aa6f5e1c42f2c9179
SHA130612a6cb493261ea46fee43c5e7e4114408b763
SHA256b5cab4632c2a4046d4ab2af17ffaffb4855e356d3895ad7a40b8840b8745fa57
SHA512a2ea2abe88e63150ce2c268b3343cf0d464d6eb55ba04ea612654508cbe597e7c476cc53c0e0e158b901126a42a9dc8fe0c2c0a951a3d536a568443356756836
-
Filesize
6KB
MD5c8516e3be422ae4b6c5c9c958c2a9790
SHA160003cebeb68748765839bfaf32f1d7eadf72f35
SHA256af21db2994dc5d4c897450ee590129eb4c52a6af6f333ecf381f115c94e87938
SHA512e13e8af35d810286964b1b935237a91d87f305305049ca554302755d7f3110a7c2379cdcfc8d57854576ecb478ce7f296f60e829d5f4d84d965c003f17629327
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ad4d68700c65a3a52efa76ec8c20763e
SHA1debaad964fc82bd931b4b94b5f87b3a1e12cb4ba
SHA2563bdccc49e90a4742e751f4e155026987a204dee5a1e2f2d43174ea15bc3b8408
SHA51238a91de6280231de353af8ca0cde41323a2577cdbfe56ede4d4bbaa32afb9eb12e3ecbbdfe045391acf7cfc13f94e94a9ad31209b8627c9458d8ba2ba60b2116
-
Filesize
12KB
MD51ec5f91c94967d06b92c0052d9917ee1
SHA18d377cab8ff4f60906449a54ef89b55146606354
SHA25641c0e965fe56192fa69cd000c477e77bfbf8969dd253bf86243f819368bd1a1f
SHA512bd46884adaa42d83584ed3e34c92f36f7744ff2bae91902c2718622f35d63545daa24add17c3d2031a850593720954237a3ec44ae6680300de33b5e1bfc20908
-
Filesize
11KB
MD52f9a156327d1090f2c8a5a77bb10f900
SHA141a3799dc5c92a649186b036f77cc8619c70d2e6
SHA2567c30a052bc8c58a90984c8391f8be3941b0b4cd9d044a041e6826669db182016
SHA5122e218774875cf6ce644b59125ae235c1a685705fa43ce5b5310e220c663c64028235d7a1281b1d43592b0ecd4f7f935d19100b7d4880dc26ab93e42491a43858
-
Filesize
12KB
MD550437548985a3b27010dc943aac72837
SHA1b226f2fb73b8c4a212f2677f067826eb65479250
SHA256cee7aee0f06bb1ec923082233c9d3ba797badb9e9c89329e75c521c17cbceefb
SHA512d7c572b505740188ade195b467879c49d3d711f9b132b962415c65470d84370f987b16938f79713fd6b09bddbefdc0442945dc7626a9c612655fa8f06d8a8cdf
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5f41f42c322498af0591f396c59dd4304
SHA1e1e5aa68d73d48bc5e743a34f6c0fa8960ff7514
SHA256d8bd9a4a363ff2ac2dc887759ec6ba4215a4ce0925a8fb9c531573458ee4a31c
SHA5122328a1b402b4fb0de9c451fb630eab58549129d3bcfb70b9834cfbd16065ebaadec006b309ea17ac182d34c53e01705cbc9e0196eb0cbd62600c866e79a1844f
-
Filesize
944B
MD5499298c8da8c8b6e630c889b60905388
SHA1b3b519bebf9861bcdad6e2e6426c2e8a96fd8056
SHA2562e5392338aeb35e2d1ca8c95cde814389a76808da33de106e860c5659c6823ca
SHA5129da91784102b7fcd981d9cd84e787b4609d6c55f359df1bc8bf27759233a8be461552c370f13a21dd953c3f1254b15fe33b6ab89745cb36e7b382934487eb069
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
469KB
MD5c672a19a3054309f3d83dc7142519d4d
SHA1c100bee4786d33dc6dafddcf36afefde7eff5086
SHA25621a17e24a75b812e83db123c3742729eb4d96fe8e51154321cfda18aa06aaa1c
SHA51264187db968b728f9ba161d641692bb4687fe6cd4c573abd0bb90bc82a693aecd829c266c9926084b336b4a10b3f5b47b8fbe4e2a469f78116608b004b5bfeab6