Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/10/2024, 00:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/Vw475K
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
https://gofile.io/d/Vw475K
Resource
win11-20241007-en
General
-
Target
https://gofile.io/d/Vw475K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 1172 msedge.exe 1172 msedge.exe 1516 identity_helper.exe 1516 identity_helper.exe 1964 msedge.exe 1964 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 2240 1172 msedge.exe 79 PID 1172 wrote to memory of 2240 1172 msedge.exe 79 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 4004 1172 msedge.exe 80 PID 1172 wrote to memory of 3436 1172 msedge.exe 81 PID 1172 wrote to memory of 3436 1172 msedge.exe 81 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82 PID 1172 wrote to memory of 1640 1172 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/Vw475K1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa9dd43cb8,0x7ffa9dd43cc8,0x7ffa9dd43cd82⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1716,854276929254672375,5066000347557747750,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1544690d41d950f9c1358068301cfb5
SHA1ae3ff81363fcbe33c419e49cabef61fb6837bffa
SHA25653d69c9cc3c8aaf2c8b58ea6a2aa47c49c9ec11167dd9414cd9f4192f9978724
SHA5121e4f1fe2877f4f947d33490e65898752488e48de34d61e197e4448127d6b1926888de80b62349d5a88b96140eed0a5b952ef4dd7ca318689f76e12630c9029da
-
Filesize
152B
MD59314124f4f0ad9f845a0d7906fd8dfd8
SHA10d4f67fb1a11453551514f230941bdd7ef95693c
SHA256cbd58fa358e4b1851c3da2d279023c29eba66fb4d438c6e87e7ce5169ffb910e
SHA51287b9060ca4942974bd8f95b8998df7b2702a3f4aba88c53b2e3423a532a75407070368f813a5bbc0251864b4eae47e015274a839999514386d23c8a526d05d85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\06346bea-d28c-441a-8d25-a70de11c9cea.tmp
Filesize5KB
MD54de2163f19fb833de6db5e17b36ad808
SHA1618750d7f1607a50ce6ed9e9f3604abb6b850052
SHA256aff67c84475b41e0ac9f8a4c772d06edb190a96aa840916671bc6f21f0a65dca
SHA51276da80f0d7b374a306b183c07b6faf98e29f8e67d4a773b17af035933eff8a60fd9abf68f40a4bcf978716601f54ce7b918e189975869443d21a8c83c9656d08
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5411db5f6f972a76a0482f1db8f2e8184
SHA141e53b597c278fd8acda374f96da45ed214ad881
SHA256d0ef6c479a4ddf2b321ecb45d4fa47312e74b8cd11b192ca00eafbe1fa92c68e
SHA512ae337b8231aef632104dba72d9d40592e4b07368ba7bdfffe7c65b6909f1f7bacb934bdd9473b9b3025175e1fd17cacf17a802195ee6490c33ad40e3272f6e43
-
Filesize
317B
MD5afc6cddd7e64d81e52b729d09f227107
SHA1ad0d3740f4b66de83db8862911c07dc91928d2f6
SHA256b5e81a7c7d80feaaa10ee7bc8aaef9f21a5c1e4b03b3823ed115022311d674a0
SHA512844edb69585153c378a7c97709983776fc9303a32fb5ef8122ecca32adfc0b265f5ef7118ee07814da5c020ac7ba1bf2a2f66d46312e4d8e6df99aab2e5f9b2a
-
Filesize
6KB
MD53101df0153a5ae0d2a6adf0acce9038b
SHA1daacf5e142bb083081f60da3cb3decb62c3d6a02
SHA2560013e1b11b75986d4124ad3ea47bde0020cc3abcffddfb55b3baf3390dd02771
SHA512759d96c6419e74ea31f22f317c50a73f1abd00b65f2657f56440a77ecfb334e0d3594e2ccd92bd197007be197870280826791f43d1f17a23a119abc0627fc2c9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5193bbd8a00ac12ede082e15184ed1482
SHA128168c79a03a74d574151c3338838bc06613a3eb
SHA256011051d866792132377e2d585ab9b1bb3b9b985379683413eb8c038d473bab47
SHA5120c76faae948fdca8e45ef1aa497bec70ed3d317c553d787ab1a86f8fd506277b0063dbddc0517f0b6dae9bfa000e0aabd1ae3bfcf312eefd45b51caab17173b1