Resubmissions
31-10-2024 16:41
241031-t7k8lazkgs 1031-10-2024 16:25
241031-twydsa1gpn 1031-10-2024 16:05
241031-tjfyzasndj 10Analysis
-
max time kernel
67s -
max time network
66s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
31-10-2024 16:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ByterCode/GameHackLoader/raw/refs/heads/main/GameHackLoader.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
https://github.com/ByterCode/GameHackLoader/raw/refs/heads/main/GameHackLoader.zip
Resource
win11-20241023-en
General
-
Target
https://github.com/ByterCode/GameHackLoader/raw/refs/heads/main/GameHackLoader.zip
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
Processes:
msedge.exedescription ioc Process File opened for modification C:\Users\Admin\Downloads\GameHackLoader.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exeidentity_helper.exepid Process 960 msedge.exe 960 msedge.exe 3856 msedge.exe 3856 msedge.exe 2924 msedge.exe 2924 msedge.exe 2592 msedge.exe 2592 msedge.exe 4644 identity_helper.exe 4644 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
msedge.exepid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 3856 wrote to memory of 4248 3856 msedge.exe 78 PID 3856 wrote to memory of 4248 3856 msedge.exe 78 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 356 3856 msedge.exe 79 PID 3856 wrote to memory of 960 3856 msedge.exe 80 PID 3856 wrote to memory of 960 3856 msedge.exe 80 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81 PID 3856 wrote to memory of 3028 3856 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/ByterCode/GameHackLoader/raw/refs/heads/main/GameHackLoader.zip1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa1e2e3cb8,0x7ffa1e2e3cc8,0x7ffa1e2e3cd82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,1396772884757522797,9046275144721487175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:1668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55431d6602455a6db6e087223dd47f600
SHA127255756dfecd4e0afe4f1185e7708a3d07dea6e
SHA2567502d9453168c86631fb40ec90567bf80404615d387afc7ec2beb7a075bcc763
SHA512868f6dcf32ef80459f3ea122b0d2c79191193b5885c86934a97bfec7e64250e10c23e4d00f34c6c2387a04a15f3f266af96e571bbe37077fb374d6d30f35b829
-
Filesize
152B
MD57bed1eca5620a49f52232fd55246d09a
SHA1e429d9d401099a1917a6fb31ab2cf65fcee22030
SHA25649c484f08c5e22ee6bec6d23681b26b0426ee37b54020f823a2908ab7d0d805e
SHA512afc8f0b5b95d593f863ad32186d1af4ca333710bcfba86416800e79528616e7b15f8813a20c2cfa9d13688c151bf8c85db454a9eb5c956d6e49db84b4b222ee8
-
Filesize
5KB
MD5b78ffe33a47809102bdaf66264fc699c
SHA116fdbdb51be13a46eafd8ea68f6cc4bbf9acb065
SHA2569dc3b3121904e93fa39fbb77a7a0323b1e6aea3d34aa8fc5c9e166c9540cc1c8
SHA512d17aa16fbecede95ce258665f4e02956f160b287d23079a2e91673ee4f0a17122fdf188aa129a02e97500c59413a09b09b2c01768ffe38ad14ea0e3ed2cd44fb
-
Filesize
5KB
MD594eba1a161de8f0adc7c1e75ca0554f5
SHA1cb0898497832c3eee402b841680cd4f7f505844d
SHA2568b5ba57794b2f3047f13e788b5c834069476da2ed85d2c647c02f855879b95ef
SHA5127aa132859088917896b1744ea90d766f1762cc0d25ad93b64a84c7669193734aca989d3917cb705c2695d9e1fa7655e891583402c0bf30ea45f0d8afc3a70333
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e13b885db1e0dc93514ff03a5b667f61
SHA1334b2abdd7f4b7e6c34a7adf6f870242603f1555
SHA25676952c7525336d7b414e6a5a282d2fc67b584fec7f6599814e25db89f079394d
SHA5126385b15c3aeb6629f7a53a92018068ca87b2aa4bda5426f4f06447b34d44a28121c468b4917b80a3642836ca0b24305b15a86040083f718fd57b4c19acf100d5
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
2.4MB
MD5ba6c31647c5a5eccf9b535dd59e5069f
SHA1445cfd5725f22c286c6ab6b950559e240528e4dd
SHA256500160c555f21bc39acc78ab1379f5156cf89abf02d0f6b66cfc3d809ae98f5b
SHA512a1cf93a3732467eb41961567af8a9778e6cd72e1f5b1219c7a7e34b88e2fa31b04e7b4cb1fd89fc166b507b558c25a1d3511cf19b3fa901a7eeda87263bc93f2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e