Analysis
-
max time kernel
1151s -
max time network
1147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 15:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/KRUCik
Resource
win10v2004-20241007-en
General
-
Target
https://gofile.io/d/KRUCik
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4184 msedge.exe 4184 msedge.exe 1832 msedge.exe 1832 msedge.exe 4684 identity_helper.exe 4684 identity_helper.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2800 1832 msedge.exe 83 PID 1832 wrote to memory of 2800 1832 msedge.exe 83 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4396 1832 msedge.exe 84 PID 1832 wrote to memory of 4184 1832 msedge.exe 85 PID 1832 wrote to memory of 4184 1832 msedge.exe 85 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86 PID 1832 wrote to memory of 3640 1832 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/KRUCik1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa046f46f8,0x7ffa046f4708,0x7ffa046f47182⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2381118884670483724,7576130834837418698,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e6324e3cc4433d4ca1bea78995f75e21
SHA1ae001d7cfe0ab3149d1646903c9aba76189b923e
SHA256dd9360ee694ee0a34508bfbc964f3b17455f147c4b15ddf3ec06f7e7fe803bd0
SHA512fcd67c7b41a503ea8506cc8a7957620afb1b6e4a02e6799aec086b123b0beebd2568b0ffba0706fa32e9090e6ae6ef82cec765c10b466c2de48e6a02dd7e547c
-
Filesize
317B
MD5ddc85b4113c92b5059298633fd781081
SHA1735ca7f963f8d7aacfe467da239224877df689d1
SHA256af5c682a3acfb11a3075ef0ac589bfdeb630d63fabce2dc57c9b3a01e0648355
SHA51291bee0a5bdce341693b47dbd7f82786c50878b33638b20a3b0d111624764d18f1cdcfc8d2d0daa40c276a5dbd6635e2bf28713d6eee909d2df2620523abad8ad
-
Filesize
5KB
MD5c8f59bd73e5d1ea3db5b279611534e77
SHA1d11eb1d572f85f29b7fecdbbc0ac201cb01691fd
SHA256e27676e04995fccd5399fb7f04232c78cf8adc39fd6cef313df52cfc689de1fa
SHA51209292f47a54595b13806e21936347410aa9f8f2d14ff53664af54d52a1d61a04402346393a307abf0ebbbd99fb16059dafdcf12755325bf504f8304b4bf080a7
-
Filesize
6KB
MD59de2768a081b85ba3e5ed3269fb8ee48
SHA119c145f79dc4438187154e85d2c43114f01f11a7
SHA256f24e214dba324754292d8dd3df312643f5ba7533f28102b068d2f088d9d82312
SHA512c1de819e219ea7fc917f86dd71ba6d03c22a1fb402168dec247f46b9e0ff038db1be29a98b00dd5d7f0ab82296919371aea8c44969516e2b2d115105b353aaa6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD593fa4e82f6ddf085dc3a4869d7aec32b
SHA15a2f18a59efae9e01ad7534ffa190392660068e9
SHA256aa29fa24cac05d495c1e5e018b4fdd5d5218267a967c27a843e75c8af662cc36
SHA51286590d3f41912d59f588aae7373494f98e53ca53e26f605d813cc2b6aa8b4ed3e94cc27f75e54dcaa9c038888c9486719afbde253cd2e65d4367f601f33a3d96