Analysis
-
max time kernel
220s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 02:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://gifthub.click
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
http://gifthub.click
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
http://gifthub.click
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
http://gifthub.click
Resource
win11-20241007-en
General
-
Target
http://gifthub.click
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 920 msedge.exe 920 msedge.exe 5064 msedge.exe 5064 msedge.exe 1976 identity_helper.exe 1976 identity_helper.exe 1108 msedge.exe 1108 msedge.exe 1108 msedge.exe 1108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1764 5064 msedge.exe 83 PID 5064 wrote to memory of 1764 5064 msedge.exe 83 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 3652 5064 msedge.exe 84 PID 5064 wrote to memory of 920 5064 msedge.exe 85 PID 5064 wrote to memory of 920 5064 msedge.exe 85 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86 PID 5064 wrote to memory of 1836 5064 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://gifthub.click1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad15346f8,0x7ffad1534708,0x7ffad15347182⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3801665802513825093,15063947827479877766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:1648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD577659fb9e09cc01ea70d78e68a20e19e
SHA1421833954f57a2677372617e5203cf6a7ec226a8
SHA2568f9137f07bf7990db2d9462a204a292ff0157cb6282eb7a390f618c116c2dbaa
SHA51219615c20811333b4023011e1bc9b521b4a4a84413899537231e50ed321f1892e33b51f16415962599ca4a67fc7c7aac0e6c57fdae6adde99f8f1f79b410d43a2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5bd2c423492ccf631a4361fefc2325bdf
SHA1f8d6070961fd5502d7e9a26034080936ddc21d5a
SHA256b8467cb531d1d6c2d254d52c261dfe363f139d25fc877f347e47883cbcb3e96f
SHA512d8217c591aa9c2ebec9d10cbf953d077e0b460a27d0a787e2eaefba5b6a31c5bc71b8eda070360af93926bbbd2357a86ecc6c2c9790f9e8b3b9781b0ebdb1bef
-
Filesize
5KB
MD562da33de1efcbed6d682a0730e29e6cf
SHA144e6fedbcfd1accba80abaed31c18958007a5d7b
SHA256d7778781836c82d0760338e6860afc3c92cc22e89aefe2fef2686d19e70add7a
SHA51274be8e82c31bd5f160196e2b69c5bfb461642e88166081f92d29955956c74d86f57e6685a96275a40352049135869eb168e5d1600b95951a5bece30346c06e8b
-
Filesize
6KB
MD5f1cc1bb99318810a024ca8df53b7f4d2
SHA1c3399d15df893dff78dd997a7073e60fc7662a83
SHA2567b6f98625bd29ebe2d1319c7b1228e152d80755f55c511251a28362f725cb6a5
SHA512459dbb73a04ec6c3ef6d30a20b2c58d3706fb041bc7f4f58cce01775ece1c33e7363d29e3dbe97755ac015dc078369bd008b0fa33f913f305d1e8ee43b8db1bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58ecf32b4edc575add996bac314617f72
SHA16b06817759dc43699a0f79edc2f9d183727aa648
SHA2566f5e0d1b77f0e9301a0bfeb9e80f0feaef680ca367d1004f6bab542d5b288068
SHA512bc961fe1449c9d736b3a53b0154738b91340cfbad293559755202c5773775a7573c52c85122438779d4cc1ee718e688a040261ffdbfd1e2d6ea3aa77a8743578