Resubmissions
02/03/2025, 17:25
250302-vy84qszmy7 301/03/2025, 16:32
250301-t14flav1g1 1025/02/2025, 18:36
250225-w9dbwa1ks4 3Analysis
-
max time kernel
900s -
max time network
1148s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/03/2025, 17:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/wfUhrD
Resource
win10ltsc2021-20250217-en
General
-
Target
https://gofile.io/d/wfUhrD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 216 msedge.exe 216 msedge.exe 2312 msedge.exe 2312 msedge.exe 3692 identity_helper.exe 3692 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 4236 2312 msedge.exe 80 PID 2312 wrote to memory of 4236 2312 msedge.exe 80 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 1328 2312 msedge.exe 81 PID 2312 wrote to memory of 216 2312 msedge.exe 82 PID 2312 wrote to memory of 216 2312 msedge.exe 82 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83 PID 2312 wrote to memory of 1156 2312 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/wfUhrD1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7fff44f046f8,0x7fff44f04708,0x7fff44f047182⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3976 /prefetch:82⤵PID:604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,7259010548976138197,1914336354286803618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1720 /prefetch:12⤵PID:4280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5fa2737e36fb74f2cc8d786ac355d011f
SHA1c501b9b9ba7231ba98db3f860196c8021414c1e2
SHA2561a0b769efaec406cfe5250d859a8a34d2fd0e917379ac3f1ed3d63984699be38
SHA5125015d38cdb5c66d4321444f1fe46f62f01c07221d76d375b00b40844ce7d44a84aab3cbc9716f0b6bb8b2f689d72eabcea1d2cc930fa5bdf13ad5031568d2717
-
Filesize
152B
MD540a7fd2af012a0035df4439e84a91899
SHA1bd0c6bec4e1bf2c0c84702b8505796975b75cc48
SHA256d19928a212694cfa6674d5b9efa82707baabdca4242023343af8dc711b355326
SHA512e68fe33f1ea0cb67d4f845724c860e70e032f1dbdf0685c7a2dd417b594f2c5c0959152a95904ce4f05eac03e31a88738f7a34de569769760dac21ae8722077d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD54584239e8ea32d673ad7afc57bcf0deb
SHA19042a90c772590c597c57fdd367dae7cdb92919e
SHA256eafbe6d88879b4c663bee43a367298f2368ae536b9c5381efd3299b888410021
SHA5121e43173c7e13ba6fb2a0d6574a1449d3e838269fba853d8e6307dfc4d870f872199e40c673ded368849fe9bc7d173abda877b76e485ed53a40a0e46361872736
-
Filesize
5KB
MD573007ae4f63f7db24708eddd3106b689
SHA162324455bc5709f61e092978fead59b7dba2006c
SHA2562997c9c5f02fecc91c64177f3f1df6b7269d4180e9b66ba30bf911311b3bf0df
SHA51295052ca9e91550cb8d81641b3d95b5c60102f88dc0badc4b5eabfb8e3ee64477a68e33b94d2d194ff154e595c787bfb2938581dea920a1f96151cd14e58e8a3c
-
Filesize
6KB
MD55abd28c0e77e93b2f7ba03f9c3c4cde9
SHA1a59b84db108f1991d45aa0f0e6c996bdb5f901fc
SHA256044917562b018fe0b221d743223acc1cfc2b3a081a0412b7770351c8209ca43b
SHA512a75d57421a612e10e8da434ea9870203862ca029b41c19c113fc028ab9e847b3adcac948dd5ad3cfe106bf5abd0abcbf8c9d62964fc4528acbf187cf03565036
-
Filesize
5KB
MD5d883632ddbcdd912f40b6eb346a7031d
SHA16d8a3df223e251cda3cca8c80a787eccf1abca24
SHA256e3def4c4ae68023dc80a48b3d849239eab7ca50ae3a7fb5b7fdc67bb56f8fd44
SHA5126e94d20c2e9132ddcc3544da7a1f91bba4dbfc8b9cf5c01a33c1e65f28d7d05bb97921f1552fbe1d1c121ce5bbd7f6d0d725b93017307b987e6d8a6134fa9245
-
Filesize
24KB
MD57cea671c9d512a2198dd38982941633f
SHA148ab2bcc5acbb87e4552f399c611aab5417b9729
SHA256613ef4fff59958c618b99c48e9f3188d1a2490f3287fd6ab6c73b40c5563ca2e
SHA5129f4f8fd48307fceb178b71885ace114e8a1fb498679c0b6814bc48ff8f6023b85d8086c5561366422ec25dca96d8413ae8458f52c6728649b99dce78fb3ce33a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a2bde87ec27c872383dd90c9a83a5628
SHA1ba6b07f937976a3cdb23b231df1f4091b4efcf82
SHA2560582a09704216a0427c96f93b55f2afa9a9d945b3acd874f21d9f59120568316
SHA512eb940415060867d933bb02d11b2f3dc73419eb8945b1d4b7a85639fca46b8bf029974caecca826546270e2bdf6f59100c11f22403984184b7898ff87f789d755
-
Filesize
10KB
MD58849c6e7fa55024ff8c9a83796d3c900
SHA1aebcb4e38fe6920196aaae76d1d931a8023dbbc8
SHA256a929f107b6fc99fa0f799499482af68f4ca615ee54d00de56182be61749b058d
SHA5129012bbc757bc09250420aabec826c79232f200d14ff8258284541c1b6852c349c0759697adfd67265b1496fe3f03eb113d29f895fa7dead5547c5db8351b3e08
-
Filesize
264KB
MD56bf6f77a54acf2a67cd9396e6a15cd6e
SHA19ef40314eca1a239b7a04e566c3251c0c7556e30
SHA256ce3246dafdb83a720cc3c327b1524ed7935aba375dff706381382a2d8076c0be
SHA5127c59ff0a8ff8d573184f1297117b782b5990a2cad48ae8e6af46d1d4f6d139c55c042d642571c319ad140afb9c5241cf5754e6d068749879a55ed94692224f0a