Analysis
-
max time kernel
57s -
max time network
51s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-03-2024 10:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go-link.ru/P4VEB
Resource
win11-20240221-en
General
-
Target
https://go-link.ru/P4VEB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 3480 msedge.exe 3480 msedge.exe 2360 msedge.exe 2360 msedge.exe 2020 msedge.exe 2020 msedge.exe 2028 identity_helper.exe 2028 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2360 wrote to memory of 240 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 240 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3428 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3480 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 3480 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe PID 2360 wrote to memory of 4712 2360 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go-link.ru/P4VEB1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff912133cb8,0x7ff912133cc8,0x7ff912133cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,10819161972487859707,1049644389002326316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD5f4cd9ec0ee7429eb2cca929901a61b5a
SHA126a391825366c7eb78939d7a3a9f7281268870ae
SHA2567036a28ea7a8e47bc4577b10391fd61cfc478dea1eb8c7770a46cc3e12904d2a
SHA5126be2f59cef9df54e62ed59a7eaab1667d79c4a045eb40fc0cd0b4e3044ee265ae0c9ecd062b090daaf233459ea5bf3c8c2f38d591ed24e163455e0e57934ec0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
192B
MD528a91c1dc47f6fa347df7ff8c0798fed
SHA14bf2e8c0ae47935dc8c730181d47092779691a1b
SHA256759600635b2a3423e660a2c7ecce80fe1710ff49aedaeff7d417f56a113b98ef
SHA5123e4c454bced56167dbfa1e41d685a16b0576b9aca3f4bb9180e90a0695805fd6d400a1c87fbf14e6d8de0ca035dc27ea8ec759a4682d7bfc702112ac7780bb29
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD502e1b4e650ff5de816349d6a5128429f
SHA1e2fff08ce5f71572cc9241cddbe8affc086ba155
SHA2560ab3d544f36e8d0b66278c23795e411cd2624c9c9cc760f4a355845c492e6db9
SHA51276aa1e295d4c64cc3454db8c89f2e7b9c522719e47f9f3c8c31619f61a0e9f9bf5fdcbc66f8c7be9bbc234c430caa7e215aaeadb8f7f0cf69ba06e266b2e58b5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5b9589391a9c6a67505d5305a353c4409
SHA11cce4097aad5094a99027aa5ae1aec414ba361e0
SHA256d0871e92a9bf2b743c8744ad771ae74a62ce4fc3d072158fd6ee312c9d9741cc
SHA51263328352a3ac3f1724bd9cad1f0a6c6cc0c0dc8eee2cbfbb6743cfc7f5d69ee884e792b4a57837f3e211bc828488dd9c670b7317b60878b269d03727bbfc779a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD53038283da0037e9a4f6aa54ab80e3c2c
SHA13ddd9fd40665699084f5fccf3e2f73b98fecac71
SHA256e84c4ccc47950c0a0a99debec4666f4bcf8ad26edd83a08e803707b7a4bf9716
SHA5126704687a705f4dbe9d9903a0feecf23cd2de44803b812b5a4e09ee2e09a330615ee4d0bede8b24010b41f4bfac018918a80fa7f2bfdc8f68e59a3d2acd8ff8d3
-
\??\pipe\LOCAL\crashpad_2360_RQQVIETNHMFZHSGKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e