Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 12:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://gofile.io/d/LOwlP7
Resource
win10v2004-20240221-en
General
-
Target
http://gofile.io/d/LOwlP7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3616 msedge.exe 3616 msedge.exe 1724 identity_helper.exe 1724 identity_helper.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 1392 3616 msedge.exe 18 PID 3616 wrote to memory of 1392 3616 msedge.exe 18 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3672 3616 msedge.exe 49 PID 3616 wrote to memory of 3908 3616 msedge.exe 47 PID 3616 wrote to memory of 3908 3616 msedge.exe 47 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48 PID 3616 wrote to memory of 2036 3616 msedge.exe 48
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://gofile.io/d/LOwlP71⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9988946f8,0x7ff998894708,0x7ff9988947182⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,1099415263867959209,6282953747678282821,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5c6f567af88b671d84e1e18730d59d8e5
SHA110a56786d3fdf734f9d2ef0fa8e33202bafab3a0
SHA256e31c6a4465e3126462f01ff647ea6048210ae0d1dc05c4e110dc7ef908f720c4
SHA51266bc72e1a760770d0eabd39b85ceff2da2356d0899ea2902d8c5287bcc15b96c214902d5d16e0dbcb442021ad4ed7dbdc3c73b828c3ce5421a522f53f6c93f87
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD50ddd3c76ce49831da5bef6d3c566d837
SHA135dc3f9873871b5e9052e1d6fb33374d88320881
SHA2560989c474ea4f2f68676cfa0429454f45124c1a9cf1ef17708cdf82551d3ad15c
SHA51214496555dd65ca0f3ccd8f85e8b889e83e156c891f7dae26b4c4b62bc1c9bf19512196663a6c26c55abb152c58ffebb7dc61e3fec71d20dc60fae1d2ccbb1172
-
Filesize
317B
MD5a22ac98703578dab4e089f7b2658181d
SHA1b9d19070e3240618f659fde83c5b05c97ac891dd
SHA2569d8b38da47c2ef4da94c7bb3ba34317f2f5e57f73db0c140396d2b899c7b7e45
SHA5120b460999da4153be276491d1fdb4291be6e88c7c86ad074d5219dc7dfa9cbdf0f84299c2e7069c28a451a9a624682f84450acc2c69e47a78f04c3b4747863d3c
-
Filesize
6KB
MD5d1bc15ccec4a0b287038c7ee2e94edcc
SHA194c2e9e2740ece6d3d3e6c975e38b922d4612367
SHA256586fd630aa86bd73edceb2fcaece5d0800deb29b92ebb5fdb49a49aac598d79a
SHA5122906cc8d895825a921ca8c1f0d3bf12ec5263a5e51385538219fa90ad43ec0ad2aa15e3361ffd9f6047f2d3ea4333e1d234488e9e39e28f244c6274e1b8e6198
-
Filesize
6KB
MD545895ba7b85dbd5f87ba68c8eacc93a5
SHA1de8cb75e6e6fbc429b1a4b1aacc72deabb8ee12c
SHA2566c5da499572e06ac281d675cc5f91c2a02621851dd561199b899b6a0b0ccbd5e
SHA51238bd357fc264896daee244da0e9c1fe17d6e96f68357e4ddf696a270c9542b77db02c43edf85dec347ab9096f68776fe60ed9e86fc75b06a94957487fa1e4180
-
Filesize
370B
MD5c7d3680511ed99b28a297ebb4654e0f6
SHA13be0945678b31c134825250c34ded3d94007b92c
SHA2565819dd343a01ff9e37b420437f29ddcf1b677fc1814208a659088188581c5b7d
SHA512c96e115045b949d37a9c95464240afb4ff7930c69b4d048eb33b1bdb805acd2981579b8833ac3efe096e10429dad2a653eeea99cbc951b7b0500654eddb5e758
-
Filesize
370B
MD5876f604019927d4cbfc5922d58c5a4c8
SHA17696210a20afe61e2da792d90a1dc726dc456471
SHA256839a36e797e470ebf41d9c57fca5818090c90821efc50a364e1436df91e1818b
SHA51276ab913e24a6d57d0e3dd57f5e044c78ade62de8b36bf2107672d03a329864543ec4497d7b34279eb0b4664789c105317fc4bcf3438d6c4aa2dcf327a5778cde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d2a9f475-9a2c-46d4-aa24-e25fa8272c21.tmp
Filesize6KB
MD5e598a13de41b05b915bba96fc2c233cc
SHA1dc980df0488ef2ea946da0cfe9f14701e07fc195
SHA25629eb60b1420a630279d7f4b976838c3bdb45b51afa4441c1daab46a37c0b925b
SHA5129f4b35b22f8deed5e99ee00ba9e732c5bdf792eec985e3202942a1cdd36505159e540814ca3bebaba737d007a67f9c82c2911f439e5f1aba2d88bad85c75838f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57f34bd89c0b2576e9db019b748cc76e1
SHA16c4eccf9d71dcc15fb155434718f466833fb9b4d
SHA2569e032a63530faf5552c05fc8df9289ba719e3b4d28798fa061e25b355080a55c
SHA512772ed86a626e4aa5e10498d7617f919d7360bfe6b71c0a0ecc2c42eba2f5e8b7e5d29d9347c158b3e7eea12db3a75e35404e98a9d4523f06d3a8639863081fcb