Analysis
-
max time kernel
240s -
max time network
320s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-01-2025 02:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/bTUNXa
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
https://gofile.io/d/bTUNXa
Resource
win11-20241007-en
General
-
Target
https://gofile.io/d/bTUNXa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 1372 msedge.exe 1372 msedge.exe 2064 msedge.exe 2064 msedge.exe 2856 identity_helper.exe 2856 identity_helper.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe 1372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1372 wrote to memory of 3432 1372 msedge.exe 78 PID 1372 wrote to memory of 3432 1372 msedge.exe 78 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3344 1372 msedge.exe 79 PID 1372 wrote to memory of 3328 1372 msedge.exe 80 PID 1372 wrote to memory of 3328 1372 msedge.exe 80 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81 PID 1372 wrote to memory of 3824 1372 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/bTUNXa1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc86c63cb8,0x7ffc86c63cc8,0x7ffc86c63cd82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,16748641868988122019,6333004177121039243,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e9a2c784e6d797d91d4b8612e14d51bd
SHA125e2b07c396ee82e4404af09424f747fc05f04c2
SHA25618ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6
SHA512fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1
-
Filesize
152B
MD51fc959921446fa3ab5813f75ca4d0235
SHA10aeef3ba7ba2aa1f725fca09432d384b06995e2a
SHA2561b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c
SHA512899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD567b10be38809dd382e8b7392fafda8b8
SHA133af3c2957178b23f121748644c3ac6078ed5596
SHA25696b0c3beebba55f58383943349a696548984e667167032846712095df0024395
SHA5126e025b67b6f03843f002808cd0f031d48494d93b83e2887bc8d1e034a979a0ebe2beaac770257e2d41b930a22ee7a109e3eef0c07fdaf59a75c620e6de754aa4
-
Filesize
317B
MD5a22ac98703578dab4e089f7b2658181d
SHA1b9d19070e3240618f659fde83c5b05c97ac891dd
SHA2569d8b38da47c2ef4da94c7bb3ba34317f2f5e57f73db0c140396d2b899c7b7e45
SHA5120b460999da4153be276491d1fdb4291be6e88c7c86ad074d5219dc7dfa9cbdf0f84299c2e7069c28a451a9a624682f84450acc2c69e47a78f04c3b4747863d3c
-
Filesize
5KB
MD5ad4e8654d0bdafaa029658d5d3fc390c
SHA149e3d2f3eef79ceb2d44797bf0716f9e742fad95
SHA2566ab5e52cf9285c8f17258728a655424d4f8609afa4c300a7725fd49ace4988c5
SHA512c32a8e0a44b905cb12d97fffc7a00372c1bf7b4264e2eb06b8224f7664c5a8539794a7c18a462ec4b0a11360080eaff36a740e673080a58a513b29bcda3891c2
-
Filesize
6KB
MD5b78368d9776a5a6cf056a9568b6728de
SHA1350cacc2e7367814a5b725ca255bad8ea85560e1
SHA25618634026d25b37a099046254d5ee941d9a75ae73e2399dec47baa1d4d23941fe
SHA512e728d7cc2aa9776404834ade876d2ea02cf0cad6ba292234a45fef217687f2f7d0045d62181955348bcd7a9b91f19d4156a9b0db9dabeca4b27afc917795ec26
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD581e1f8d9ebe668d429be3e0c3f504e6f
SHA1160e397026c1606e8fccc55736487c6c92ed8830
SHA256b6c52b20b8af19bfbb5f951ffbded923214e12415d99966ce3b615427c0e245f
SHA51217291df528462852bfed034c02826c358df98c654fdc5ce033295bfcdd288accf1e1584b17474ad7127867c5d7459167a4e7530d2976786b60e813e55f6e158f
-
Filesize
10KB
MD56acecf5510de5b388715b68292a135d3
SHA1259c6c30ac94c24692781a55b69968eff1e35c1c
SHA2564745b348b715cd2ca703dd19cebf5f97bb36763ab4f1f910beeae252b811cfea
SHA51216231c61fe9b15c45710b1acb020177c803ffeeed261091bae9c6b8006fae26ed6cea9eadd89a22b6b67165e9dfbad4152bacef086fa38510c46177aa9da1d15