Analysis
-
max time kernel
44s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 19:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/5oZFEU
Resource
win10v2004-20240802-en
General
-
Target
https://gofile.io/d/5oZFEU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4320 fn.exe 3296 fn.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2152 msedge.exe 2152 msedge.exe 880 msedge.exe 880 msedge.exe 2428 identity_helper.exe 2428 identity_helper.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3284 7zG.exe Token: 35 3284 7zG.exe Token: SeSecurityPrivilege 3284 7zG.exe Token: SeSecurityPrivilege 3284 7zG.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 3284 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 3744 880 msedge.exe 83 PID 880 wrote to memory of 3744 880 msedge.exe 83 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 4372 880 msedge.exe 84 PID 880 wrote to memory of 2152 880 msedge.exe 85 PID 880 wrote to memory of 2152 880 msedge.exe 85 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86 PID 880 wrote to memory of 1208 880 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/5oZFEU1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc0a246f8,0x7ffcc0a24708,0x7ffcc0a247182⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4012 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,1258733283844625310,1870398582897551204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4160
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4696
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Updated\" -spe -an -ai#7zMap28512:76:7zEvent178461⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3284
-
C:\Users\Admin\Downloads\Updated\bin\fortnite\fn.exe"C:\Users\Admin\Downloads\Updated\bin\fortnite\fn.exe"1⤵
- Executes dropped EXE
PID:4320
-
C:\Users\Admin\Downloads\Updated\bin\fortnite\fn.exe"C:\Users\Admin\Downloads\Updated\bin\fortnite\fn.exe"1⤵
- Executes dropped EXE
PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD54685ea4fb6cd2f59f76b9f265b83bca0
SHA1577b9b78b286544d5093d38767e66055efd7039c
SHA2565b711f73ba89eda5ec775e2870766d76873e7b0297becf879c704ad32b5bf10a
SHA512a8595219792360f6caeccb979a5ceb90e290de52846f937009181959bba8b8bb7b964b48984171d16bc656c5b372377b6c7e568cb006bc87b3ec507c7175b003
-
Filesize
392B
MD54dd3287f37fa761e67f5df9f3050ed2c
SHA17b84004dcf41c786ba5d6887fa9246956672e772
SHA2562f693a4758ca8e853cb491eb6d2996ab121ac16ab0c047f919d8705988ce4809
SHA512229d47f35e0e6f5f537314bdd0c26b5ddf3c56e4da2ac42a073c9cdb74d1b34b60c5f80ad46b8640af7afa1c4b3550bc6bde787eed6ee46931598c87a4b761ea
-
Filesize
5KB
MD518ca4f0ac540a16504e06473b067a739
SHA1ab8704bc60246df1ac8b0fe235b3d3120b15282d
SHA256458c610eebdc56e486c17e6a9dea93c891eb45a160d0e3d3f3f591dd4b2a92f0
SHA512da748c242ff72ffa86a92ec92ce132f06b0a740d90cc76fe252464ff1b4f9ad9b058093329e9badfbc6ee8f7a2363d6772dc529fdac01a7414900504c94fb502
-
Filesize
6KB
MD57bb788855f26942d273e33b095b66dfb
SHA1e94bbed10981fab8f5da836540f64287e831db3c
SHA2567a3ac4675674de99d66d332ba2b475b48d64adff89be438043dbe92f55afd275
SHA512f75ec93d50b9da1c221a2320f8c58d8f57b0ef5a630cb5ad442a6d0ffbe76a908137b157ddabb9fa14915499408ee4e179fc83a38cd10f171bb0f023d42d57a4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5547a881b26f82ee99ed8c244d068b40b
SHA1c4956055878bc4716d74cfb5b3c4a76c4293e6aa
SHA25643ec8f9dffa7079da92b6ae03030d9c8ecaf12a95c5cb8e502ab677ba2d698d7
SHA5125a58b1343fb428158714e7741c2b91b3be03755756f9d214dee5c3cdc1af9ef6e1bd22b67c338cfa866d97bff4cdb7c6f877e9cef5b953597ecdc1695d93d838
-
Filesize
15.7MB
MD593d3883073c0f5c22a3ef308d5a74818
SHA1548778112529778b71d55c0b9cd5dbe80c46098b
SHA2564d86417ee32ea3a9b2af2308f1e8a1f31baa589553f490539cd27c8bc4db0c62
SHA512b511ceb9d2d645400b4113c81ced564839f063f2bc74b23348c5ee7d68f4e24f9104baab33f1b0341906ba73beef7bfcc8acde73d60b97bd641b8bee3bfa9a15
-
Filesize
2.6MB
MD5c7ceb7115431b1db7fc0143e259aac70
SHA1b39e5a1341c4a0cad8b13aa979694f2d1637211e
SHA25607b05dd72be35697ab92854359378d779ceed8a097782088749e4011b0414775
SHA5126bde31b1611442b95fcf82b749059a34cd6c72981a4f3067cfcca32ec72357c23e145c6ad2affd162b70f1372fa35e3cb22968d6c51935f86e39a5b6520ca02f