Resubmissions
02/03/2025, 17:25
250302-vy84qszmy7 301/03/2025, 16:32
250301-t14flav1g1 1025/02/2025, 18:36
250225-w9dbwa1ks4 3Analysis
-
max time kernel
240s -
max time network
272s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250218-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250218-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25/02/2025, 18:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/wfUhrD
Resource
win10ltsc2021-20250218-en
General
-
Target
https://gofile.io/d/wfUhrD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 2136 msedge.exe 2136 msedge.exe 4280 identity_helper.exe 4280 identity_helper.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1944 2136 msedge.exe 81 PID 2136 wrote to memory of 1944 2136 msedge.exe 81 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 3368 2136 msedge.exe 82 PID 2136 wrote to memory of 4368 2136 msedge.exe 83 PID 2136 wrote to memory of 4368 2136 msedge.exe 83 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84 PID 2136 wrote to memory of 1720 2136 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/wfUhrD1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7fff3dfb46f8,0x7fff3dfb4708,0x7fff3dfb47182⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:22⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,10913771673949635936,2567271518098772740,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2440 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c787930d470d0be053d565378051623e
SHA128e41641d6c01ee6eac6d8da2b1bbcdf846bbaf0
SHA256a80de15c02d30a203b3ed152d11995318fe79a4eb99fa6de1f5600ad6623248f
SHA5129736fc38006a0e8bf29a1c87c251afa1d47dfbadefbc16e844c15d626dc7d0aad622e3bd0925f3abe745a312914a3e9db2026439cbbd2a752589d1f3499aeb7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f13caae92a9428c5adc092ae2798e0fb
SHA1aea0bdd1d5b5f78ff206d3a8659c28aa08c0864a
SHA2568d80207ba499b76ec77a295c52ea802c8eae644056c6a6c3990614938ee64078
SHA51280edd8f0708809c441e0fe9b0ebf6c957bef1a01d39a493fa7ee5acea46e2c915b57815b0754235dd36e8adfa3da94e0596ba6754bfd93748b00b293d7ab2b49
-
Filesize
317B
MD5a22ac98703578dab4e089f7b2658181d
SHA1b9d19070e3240618f659fde83c5b05c97ac891dd
SHA2569d8b38da47c2ef4da94c7bb3ba34317f2f5e57f73db0c140396d2b899c7b7e45
SHA5120b460999da4153be276491d1fdb4291be6e88c7c86ad074d5219dc7dfa9cbdf0f84299c2e7069c28a451a9a624682f84450acc2c69e47a78f04c3b4747863d3c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD573948f34526760cc36cd993401d53e5e
SHA129a1d4a46070cab3b7351915aff41d14049af5e8
SHA2568a538347d3e159914d8f1e7e303e866dc43e1dddfddc158e854629e528b1efd0
SHA5120efecf4c020869c5196c8025e1a8376518ead05a5203db2270b531508a2c1b994f375aadf1f1385c54349d4b837e915f2d78e68e1878fef81dcde4a3f63d7450
-
Filesize
5KB
MD5e789c7cc13b1e5cccfcd24952c0376a6
SHA1a54608489f99448e483e8c6b5a522b5caaf64d44
SHA256318c4becca38df525bef3b4a16377596c130de7a670cc23239a32e1dd959911a
SHA5124b2fdf6dc8139ab6512a0fd7cc860a6fe4d4510e8030542b15ee021455904aa7304866edd84043fb43d88f46563f7f3a2336e4f681246b56e0616ef94011be80
-
Filesize
24KB
MD51edf6f37c628c6895d356ff20298d788
SHA16dc47f8fe099869cee780fb69346f7e589d62447
SHA2565df60d0b5b2d28ab1ae07d30de581aa6f0546fb1610b0a67410a63b1603a4b0f
SHA512f0e37e08b92dae0c8d3e0097226921d824d251ca6c7625e7d2f802d1aac59ef8dd4168239dbde758e45f450d80ff4495e3a46e119b3c938927c996d8ef2f3bfc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53f56efd87719bdc8ee36ac3cbfe6c45f
SHA12f580b1e0e77e9356f85da461947569debda1ad2
SHA256e39b110b3618a7f94737b13ecbdfb338685b617bcae9b632e1b3c40af25a0639
SHA512dc7c1cbde47105db142fef27801fc947256ea0aa5931d41c253670176009b12b62f4548fdb02f5cda3416d5473f1d9218019dee3e8398b452ae9d48692c7d07d