Analysis
-
max time kernel
45s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
Gadzosense-14.7 patch green– kópia.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
Gadzosense-14.7 patch green– kópia/README.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Gadzosense-14.7 patch green– kópia/gadzosense_free.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
Gadzosense-14.7 patch green– kópia/yFdx6fLW.exe
Resource
win10v2004-20240419-en
General
-
Target
Gadzosense-14.7 patch green– kópia.rar
-
Size
642KB
-
MD5
d3f375c472fbc4be063df97dc3574a38
-
SHA1
e9f4c92ff53d4be84b7e99dfa27631643dd22f4d
-
SHA256
0c4646a140029dc5bd0fc234f4ae4539c25b463ea7ff5c0b898fd0c8bb2bc5e1
-
SHA512
2ce2b43e14400d59fd1e8fd3b7c73f032ea593c497b1b92b0ea1ce5264c3b7fe04630cbeb746a2c7baa8d95fac5c14215e073303f894e5ec9eb80865a6723499
-
SSDEEP
12288:w5PW9eJPpZa4XIS5Q8uA6WbBVi89orBCot+Omd2sqvK1HWjjZLv:wYeJPprhcwfarBCo0xgK1HWxLv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4672 msedge.exe 4672 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1944 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 1576 3880 msedge.exe 93 PID 3880 wrote to memory of 1576 3880 msedge.exe 93 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4740 3880 msedge.exe 94 PID 3880 wrote to memory of 4672 3880 msedge.exe 95 PID 3880 wrote to memory of 4672 3880 msedge.exe 95 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96 PID 3880 wrote to memory of 2852 3880 msedge.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Gadzosense-14.7 patch green– kópia.rar"1⤵
- Modifies registry class
PID:4576
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\CompareExit.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97c4c46f8,0x7ff97c4c4708,0x7ff97c4c47182⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10655979175599804445,13729675458269396475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,10655979175599804445,13729675458269396475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,10655979175599804445,13729675458269396475,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10655979175599804445,13729675458269396475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10655979175599804445,13729675458269396475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2672
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD578f2c5c6cfd40438116ed2d52b05142a
SHA19592d881a31de32a4ca4d35b06189a759bc6e6e3
SHA256ce0c048cda2691e6164e7ec8a8120607cef304b2678c0ef15810470f4bc97272
SHA512b8879a22b756870082b19271d2b88580456ded1d57a2afc85d03c4eead4f208edae2880c5342c8b8fda9f3361a50e62cd2be3540442376c35beda2038f2e0c2a
-
Filesize
8KB
MD55ea41c1402d98536a667579dfeb5138c
SHA16d4742466d4783d3a9c736c0002bea08eff4e5e8
SHA256d1c5c04b1233a32ba9d5dfbc6a430976ded0ce5d3c91590cca3bdb53ce323585
SHA5125cd693ad60e740d40225e4b1919e2f47ea4a810c82a74fce8a5c2f39c22eda02c0df9a4d2b10d8ed0bd18ddc2a2561d927db92ca74ae56711dd6634452857f91