Resubmissions

10-01-2025 03:28

250110-d1vwfszqbt 8

10-01-2025 03:26

250110-dzcy9aspfr 8

08-01-2025 04:07

250108-epr6vswjcl 8

08-01-2025 03:43

250108-d94vqaspcw 10

Analysis

  • max time kernel
    222s
  • max time network
    215s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 03:28

General

  • Target

    https://gemini-desktop.com/download/gemini.exe

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gemini-desktop.com/download/gemini.exe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81e1e46f8,0x7ff81e1e4708,0x7ff81e1e4718
      2⤵
        PID:1724
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:2
        2⤵
          PID:5044
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1616
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:8
          2⤵
            PID:2100
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
            2⤵
              PID:5024
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
              2⤵
                PID:3028
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:8
                2⤵
                  PID:4148
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2912
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                  2⤵
                    PID:4264
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
                    2⤵
                      PID:3404
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:1
                      2⤵
                        PID:408
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                        2⤵
                          PID:3096
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5352 /prefetch:8
                          2⤵
                            PID:3612
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:1
                            2⤵
                              PID:1076
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6140 /prefetch:8
                              2⤵
                                PID:3240
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:228
                              • C:\Users\Admin\Downloads\gemini.exe
                                "C:\Users\Admin\Downloads\gemini.exe"
                                2⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2736
                                • C:\Users\Admin\AppData\Local\Temp\is-ODEO7.tmp\gemini.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\is-ODEO7.tmp\gemini.tmp" /SL5="$9025C,107203419,761856,C:\Users\Admin\Downloads\gemini.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1780
                                  • C:\Users\Admin\AppData\Local\Temp\is-SIR4E.tmp\driver.exe
                                    "C:\Users\Admin\AppData\Local\Temp\is-SIR4E.tmp\driver.exe"
                                    4⤵
                                    • Executes dropped EXE
                                    PID:4884
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd.exe" /C del /f /q "C:\Users\Admin\AppData\Local\Temp\is-SIR4E.tmp\driver.exe"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3876
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16037393198685084529,1939546045049120008,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5704 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2260
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1768
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1820
                                • C:\Windows\system32\taskmgr.exe
                                  "C:\Windows\system32\taskmgr.exe" /7
                                  1⤵
                                  • Checks SCSI registry key(s)
                                  • Checks processor information in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of SendNotifyMessage
                                  PID:4116

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  56a4f78e21616a6e19da57228569489b

                                  SHA1

                                  21bfabbfc294d5f2aa1da825c5590d760483bc76

                                  SHA256

                                  d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                  SHA512

                                  c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  e443ee4336fcf13c698b8ab5f3c173d0

                                  SHA1

                                  9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                  SHA256

                                  79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                  SHA512

                                  cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  2196eede92afba3de36ad07b849d22e4

                                  SHA1

                                  224344b1c1a5b6de38e96c4c65bca44303d14b19

                                  SHA256

                                  b8459167c10b33353970b290e0783306acf2de298667b322da759a4d037422cc

                                  SHA512

                                  863bc7d7a4bfe3635318989b08594088a638548bda2832bcd61d509cbfe09da1d6fdaa93da40ba88054af96eaaf26cafdbc1c4eaebf564a0c13aad242da40571

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  09e5eaa53482aa8cf4b4e416ac362de8

                                  SHA1

                                  d3e6e1946a10330093de73389428b6ede6583d3b

                                  SHA256

                                  a5e1ddc4a4fa540e5b6329105c8891b28605760aaea30f3d6b7a9c96dba9613c

                                  SHA512

                                  1d012b22dd5cb3734b0eba4ca504d28d63c3adfa39b105dae646fa2fae6f3a48aaa84436782b8406195096c77a8e7f1032eaf2f65bfaf86585eec4bdb93a1ae5

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  00581d8567c5567b3ff27be0781568c2

                                  SHA1

                                  e7dd8c30b13972873c2392f1cc14663994f744a9

                                  SHA256

                                  48a6a2146879fb82f69f6bf5bc6d521c1f60dd7e4fe7c9ed9de1e4aad681a2cb

                                  SHA512

                                  4cdd8b4ff84feb0564a01d7e36f82ef32e1d24a70b1a790b8d730c7b76437b41935774f7c4a6af410fde3c04ebb368eac3df21133edf1c98fd9c67bc20005c9d

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  135746496636761bbef4a5fbfc185e7f

                                  SHA1

                                  3448bdec856eaa4caa91b463af22b7bbd8a7e3cc

                                  SHA256

                                  ad1a6fd21c9a8fa596bc27faf4c68b8a0405a8cbaae58cc7e338646a9f3195db

                                  SHA512

                                  b61b26f92c47c365de7903588e2b01d0a3ac4159059aec1c91b50349379a9552178c1392c31a4ff4a5ecd26990f1d31f8916c463d6e5b154ad71f1860d8593cb

                                • C:\Users\Admin\AppData\Local\Temp\is-ODEO7.tmp\gemini.tmp

                                  Filesize

                                  2.9MB

                                  MD5

                                  9e3d21ba2007d8f2d178a26c21ced9f0

                                  SHA1

                                  cf39a2f89bc9d72404b74d19b48938f4ae3ee0fa

                                  SHA256

                                  21a8d0d1ac67a892e8d2e4f04e5fae2683bc43e384ef6d9ee6005ddea1b966a1

                                  SHA512

                                  295c7dc56c943b76fdc07a3505a081de21c2c8860b034c77780d8257ac8008fbeaa9240524ce08b2a6bb13530f780b669ebc5d8c5ebd6b0be840d7549bed76b6

                                • C:\Users\Admin\AppData\Local\Temp\is-SIR4E.tmp\driver.exe

                                  Filesize

                                  7.2MB

                                  MD5

                                  f0f8cdf115e89e3caab43f50658ba709

                                  SHA1

                                  19dfa9bc7437c7ec11dd4192700f2b9c9b324cef

                                  SHA256

                                  cfc26c6a0f8fec7312ba9c79a3d186cbe01867936c7ade98f201fbf9b6ab90a5

                                  SHA512

                                  697ad6802af19932003ea95ad0210b782d778ae41aefb1192a4ff58b05c1c124d9935df60e16e374dc7c1e0f4e197e4cb423dd10bd81cb8c6c6ffd44f48f972e

                                • memory/1780-142-0x0000000000400000-0x00000000006FB000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/1780-152-0x0000000000400000-0x00000000006FB000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/1780-168-0x0000000000400000-0x00000000006FB000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/1780-178-0x0000000000400000-0x00000000006FB000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/2736-112-0x0000000000400000-0x00000000004C8000-memory.dmp

                                  Filesize

                                  800KB

                                • memory/2736-141-0x0000000000400000-0x00000000004C8000-memory.dmp

                                  Filesize

                                  800KB

                                • memory/2736-179-0x0000000000400000-0x00000000004C8000-memory.dmp

                                  Filesize

                                  800KB

                                • memory/4116-189-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-191-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-190-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-195-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-201-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-200-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-199-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-198-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-197-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4116-196-0x000001DAF4F00000-0x000001DAF4F01000-memory.dmp

                                  Filesize

                                  4KB