Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 18:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/lw2sxq6ewr6b4er/GTLua[ST24.3.20].rar/file
Resource
win10v2004-20240226-en
General
-
Target
https://www.mediafire.com/file/lw2sxq6ewr6b4er/GTLua[ST24.3.20].rar/file
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 232 msedge.exe 232 msedge.exe 3004 msedge.exe 3004 msedge.exe 3948 identity_helper.exe 3948 identity_helper.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2500 3004 msedge.exe 88 PID 3004 wrote to memory of 2500 3004 msedge.exe 88 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 4092 3004 msedge.exe 89 PID 3004 wrote to memory of 232 3004 msedge.exe 90 PID 3004 wrote to memory of 232 3004 msedge.exe 90 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91 PID 3004 wrote to memory of 2296 3004 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/file/lw2sxq6ewr6b4er/GTLua[ST24.3.20].rar/file1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8633946f8,0x7ff863394708,0x7ff8633947182⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,3187420691007832503,8348039569095365160,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\39ae38f1-2d65-499f-a5e0-6a71f8b64532.tmp
Filesize5KB
MD52482201b1216ebf3d43773591b8eb47f
SHA1b7c3028a44bcaa9b2d581db6610757b123e85cf2
SHA256050f01ed8a75b282b407777ef11e46ad4592e70017c0a1fa95687d66c931a3b7
SHA5125dcfd45183798ab9dfc82bf508f33cae6a9c4480fb24967ae5c25c6d09e368d1be3301dbd5415446c73e756d8be57c501ce9b1fe1638e1e298ea1836cb4f49bf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD50ea55ccf816cc56056a5b49d0cc19672
SHA162e520ad817e165ab5bd0797e1c34633e862d403
SHA25620f40900cdeaf532e73ffa7573239c65f6b5af68cec8b3cc751d6157a986745d
SHA51255862bb9fd95b06c4a6737dac9c7178961020fdfbe703e51f071d7b980fcbedc385e85ff5ea676f0af8a083805c60101863a4c39ccf3a63004ed102a2cbcd221
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5093f56be120c82e908dcf4f3f3858d9c
SHA1eea63cc315fb1d6f0de5406db3fa98ae1355f7bf
SHA2569a09273918be1230c4c5160641663b79be7abca3111c3bbbaba6a5b2f1b9a1b9
SHA512ad1457456eab3181c1475d274433cb416cc97fb4ab2685b185f3c58b4cdd89485c6c02e2f77090f6e869ce7cf01d300e7bbd7353641babd119514304d6daee6c
-
Filesize
8KB
MD5f885c19d2fb3e47cfc0e10899e4a7230
SHA1cece546ef3ba14e810a86f1895985dd32121f12d
SHA256d1e3e7fe7b603c91cc5645764ec51f15f8f6eb13b3e037a6423faf4b35a4f6cd
SHA512dd8c5afa5e3fb519350cfdbd9d605fe2531f4b87dafe7ca40cb7ea3727dfed4911359fa8e0beac449efdbd11284de6bb1dfad63beee234f19987e4c89e60da88
-
Filesize
8KB
MD51b498e11e48b158ef439ffef3661999d
SHA110d6c718ed710e10e0241501c591d4df153bdfe5
SHA256869f54d0969c6ca9ec21b06c452d9bcccec89dd2800d9f3bde80d502d89f25e9
SHA512d914b350e7d07e9e91df5dcecb54ff71d0eaff4bae65b444a13a529b5fe5e2762e115f7d1222bf811c184d3cf182849adb034d4ce8662c9a6427881041b8496f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5773ece844d135b0ef9bf8b3d85c23d3c
SHA1ab8b8ab189bf4d0c5f9a3032752731c3575ace96
SHA2563b3007e20eea2f961e32ea9c445ba0e739f89bd5e6e55a2bad99f4a338f66e23
SHA512cafbdaa0bdb8391b409b17e1a448be8f15a049b72ed3d38c145b61532457c39d74c86873cc209fbc8ad5f499cb2085f38db87b1e07fed2dee60feb229a75c902