Analysis
-
max time kernel
1680s -
max time network
1684s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/04/2024, 18:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://oldgamesdownload.com/file/32698-2/
Resource
win11-20240221-en
General
-
Target
https://oldgamesdownload.com/file/32698-2/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4348 msedge.exe 4348 msedge.exe 1420 identity_helper.exe 1420 identity_helper.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 1520 4324 msedge.exe 77 PID 4324 wrote to memory of 1520 4324 msedge.exe 77 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 4980 4324 msedge.exe 78 PID 4324 wrote to memory of 1688 4324 msedge.exe 79 PID 4324 wrote to memory of 1688 4324 msedge.exe 79 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80 PID 4324 wrote to memory of 3636 4324 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://oldgamesdownload.com/file/32698-2/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0x48,0x10c,0x7fffcdd03cb8,0x7fffcdd03cc8,0x7fffcdd03cd82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,15760814140770786908,10946946010242464918,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a0407c5de270b9ae0ceee6cb9b61bbf1
SHA1fb2bb8184c1b8e680bf873e5537e1260f057751e
SHA256a56989933628f6a677ad09f634fc9b7dd9cf7d06c72a76ddbb8221bc4a62ffcd
SHA51265162bf07705dfdd348d4eaf0a3feba08dc2c0942a3a052b4492d0675ab803b104c03c945f5608fac9544681e0fe8b81d1aaca859663e79aa87fcb591ddb8136
-
Filesize
152B
MD5ded21ddc295846e2b00e1fd766c807db
SHA1497eb7c9c09cb2a247b4a3663ce808869872b410
SHA25626025f86effef56caa2ee50a64e219c762944b1e50e465be3a6b454bc0ed7305
SHA512ddfaa73032590de904bba398331fdbf188741d96a17116ada50298b42d6eb7b20d6e50b0cfae8b17e2f145997b8ebce6c8196e6f46fbe11f133d3d82ce3656db
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize720B
MD5d712301c5ef016b9f134c99eff151509
SHA1015dbebfcedfa8c0ff738fa71c4b4ea2f464fa06
SHA256c371aa5d87882aa7cbc20bd62132116af6299f95d1c7fbab04df30b96ff51714
SHA51242876acf5556ef12fa2639cfabf2f90d3bf2648703960f621da0b7e464363ac0afe1231eafcd9bc77a7dc03ea66332a2c9708a58370d48918a16cd30c1b5527b
-
Filesize
2KB
MD576d5fe4b224e7bc8f5394d84ddf55aa5
SHA190cbe0c0c398a9d2474a2ec7d50594a7667a7539
SHA256a06f938b4c49b3a9a978f975b244036b0e0a7e5fdf7f0634aa5b426567a96dc6
SHA51258471f58f328fcce9dd9547ae6c40a97eef3a1c4c10137cc1e8eb4173350f221cd11447417bf5d7c38135121029d37728556e19c5f3ee93fd4333bd06c7ac9c8
-
Filesize
6KB
MD5dd3f56d7de88f420252b5dfe7d8cf185
SHA152fb9836df5cba5b37a4fdb3a1c218f163cd5171
SHA256b2cd5bd58048b012211a65c705b2b2e967b776aded896fa1adcea24933fbfa07
SHA51246d8f81e4ad3a1c6e3302fe4ef01c6aecb9e7553080fffd650b0765851beca85d171f39f3595385e3a512fdcb67a0f283b6cc00d67a659c055f356288a051d10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b725178d-46e6-49e4-b950-797472d3cc1f.tmp
Filesize5KB
MD5aa76c62fb287fde7722ba66cbba5efdc
SHA100c600419f0f33427132feea3b0c3b8e1df8e0fe
SHA256a064f07a2846a6bd5379aa6767b5c4b4a3acd9115f6be47fa030dc81b1a1438c
SHA5125a347c7660e5d0667522d0266bbb25b268e03179242ac1af7a8291186440d4dc11521ed259b20850c98b28ff474570d8a68fc7cf1f0193a2f832556d3f915d23
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b521f9fdcb66208854bd2dea6d2d2913
SHA1ece44fde5246159a4c0579724a43f0ecb49da99d
SHA256a76dafcc6a8747992f4d530120061c1ea60efa12201c7774dd57c95fc1417c63
SHA512cab8bc9fe0b799672801d40d5379597a17f70470442779afc63808fda67a8c4a64fde49383df7cf6438669489646ead992b380a77df84aad112b12075e253926