Analysis
-
max time kernel
156s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-05-2024 12:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/hmYSyV
Resource
win11-20240508-en
Behavioral task
behavioral2
Sample
https://gofile.io/d/hmYSyV
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
https://gofile.io/d/hmYSyV
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
https://gofile.io/d/hmYSyV
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
https://gofile.io/d/hmYSyV
Resource
win11-20240426-en
General
-
Target
https://gofile.io/d/hmYSyV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 920 msedge.exe 920 msedge.exe 4516 msedge.exe 4516 msedge.exe 1348 identity_helper.exe 1348 identity_helper.exe 1844 msedge.exe 1844 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 3268 4516 msedge.exe 79 PID 4516 wrote to memory of 3268 4516 msedge.exe 79 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 884 4516 msedge.exe 80 PID 4516 wrote to memory of 920 4516 msedge.exe 81 PID 4516 wrote to memory of 920 4516 msedge.exe 81 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82 PID 4516 wrote to memory of 4052 4516 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/hmYSyV1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa35963cb8,0x7ffa35963cc8,0x7ffa35963cd82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,2900481037811214111,9862668964788902383,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51e4ed4a50489e7fc6c3ce17686a7cd94
SHA1eac4e98e46efc880605a23a632e68e2c778613e7
SHA256fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a
SHA5125c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28
-
Filesize
152B
MD58ff8bdd04a2da5ef5d4b6a687da23156
SHA1247873c114f3cc780c3adb0f844fc0bb2b440b6d
SHA25609b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae
SHA5125633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5fad308cc822a996fb6cd02c6e1f9ac64
SHA12ebbe63692e25a4e9f15b0b8d6ad078587b5ed15
SHA256c1b72482af0e8df99403dc091e8de035c2befc47c9c90e95ab5b44716a3e3f3d
SHA5125e42f191578cba48506742fea26ae4bf6db6226cce2d238eb4fb405d1bcb95259506276ce1d3554367d82c30d903193ce366e2d195802af2c6cc025a1f82b444
-
Filesize
317B
MD5afc6cddd7e64d81e52b729d09f227107
SHA1ad0d3740f4b66de83db8862911c07dc91928d2f6
SHA256b5e81a7c7d80feaaa10ee7bc8aaef9f21a5c1e4b03b3823ed115022311d674a0
SHA512844edb69585153c378a7c97709983776fc9303a32fb5ef8122ecca32adfc0b265f5ef7118ee07814da5c020ac7ba1bf2a2f66d46312e4d8e6df99aab2e5f9b2a
-
Filesize
5KB
MD503b48b4a48e77a2be7ece694472ef14e
SHA12ae140743a948d2e97287f62b16c04d15665559a
SHA256a913908a57d769f994455aeec6ce5d9c1936a4bf3e75cd84ee96a68e96222703
SHA512fe66467d05526140b185d1b1aaf28d48ed83d302b28e626474bb9c1f46c76b07965da4c6f6ba3c79fa283ca88095d0a6f1c0176791b05d478d5fd37e2cb6f13f
-
Filesize
6KB
MD56becf4e3187d29cc2473b3759e2c8f84
SHA1f13d9858878cc04f3ca1b1d459cd724db4a80d3a
SHA2564cbfda13a30c22d5a091736ddcb8477ae4f4087ea5c9b4be0d6672f6bfdf5c92
SHA51295751d80d745ab19de3b0c7792d1530de4f621696baff14eabfb308a493b3ef43f47ace1f5ade82e7a878f124044edab69b72d840ff5da5b54c44f66312542d2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD591c33c79807f4f9bba1b364ec15775d0
SHA132c573b112bf62953b7b00264f8e837702c3c312
SHA2566d724d296b1e28efa22e7ed8b56a0b86e791415cebdf1ec08d1da22067199c5e
SHA512d6285be262bd8e414d401ba029549c2b7d6126d6ec08a186bd99f9c4c0360f11ebc1d55756ba7eb51a3f75b1808a69bf4fcb8180820441ce375c54df411599ca