Analysis
-
max time kernel
31s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 03:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/xsplitst/RGF/archive/refs/heads/main.zip
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/xsplitst/RGF/archive/refs/heads/main.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 4632 msedge.exe 4632 msedge.exe 3392 identity_helper.exe 3392 identity_helper.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 1984 4632 msedge.exe 84 PID 4632 wrote to memory of 1984 4632 msedge.exe 84 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 3308 4632 msedge.exe 85 PID 4632 wrote to memory of 5028 4632 msedge.exe 86 PID 4632 wrote to memory of 5028 4632 msedge.exe 86 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87 PID 4632 wrote to memory of 2752 4632 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/xsplitst/RGF/archive/refs/heads/main.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadbad46f8,0x7ffadbad4708,0x7ffadbad47182⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2164,11008097312787651053,5773625572052097794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:880
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
5KB
MD5faf029ff55a93d13b26d76c3c24866d5
SHA153ead8573f10b9a1e600778478b14f095ce09eaa
SHA2568489957d008a35e5141ef56d32af47ae1c98fe3750d398e77ee86f5a672ddffe
SHA5124b91b9acc35182450cf08bdbdb7b719dd1bb2ea1796d71da06fb84b6569bc8b4ec44ee56ae2afd0386f52bee3f91b510f8d50add9d88edfe9ac049ad6bda0990
-
Filesize
6KB
MD50727fac6fa18a24b40e7e55b7531a81d
SHA14dbb21001d76af1cbbb1968f252af47201f02495
SHA2569169ded83dca7fc90a2063e199898721046371840b52d5e5952c23a4a6c3d5e1
SHA5125f1422bb7594411f9c5bef6e190baf5923c99aece19a13ee107988df3c1b449f2109c2c1d0988b1033b97be40f25eff4c596598c82cd1729bcb1b52f77dcd297
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5018186035eed8ce8fd1017c098cabb9b
SHA18fa61adcb85708912bf8169bce59cb2423293265
SHA256f24239121433b762cf81e83b2c7a28ccf721556e532b0f749df2a25f70bc9658
SHA512bf491f2a601f86932068e35a623732dfb6b7beb970f6182261a2f66a79e4e9fc0e164c60e2de584b467846231a7528765bb32b026f04c01a914e94618f79003b
-
Filesize
54KB
MD57bcc565dfb0ce789f9a984870a64414c
SHA17918e05800b7d02be5aa3670259709fde7f5c268
SHA25633461d788a33b88bed3d489826f9fb766cae421f322b81c5eb861718a1dea7bb
SHA5120490c139cd781e827fa35e55d21d887990febb2ab158baac005755ae1825904cf8f2971a10e75e135fa350c40ac841815ddeb2fd5c9da2d7b350e9c509f027b0