Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1145s -
max time network
1151s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/03/2025, 15:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://gofile.io
Resource
win11-20250217-en
General
-
Target
http://gofile.io
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 api.gofile.io 15 api.gofile.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3764 msedge.exe 3764 msedge.exe 3404 msedge.exe 3404 msedge.exe 1604 identity_helper.exe 1604 identity_helper.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 3672 3764 msedge.exe 79 PID 3764 wrote to memory of 3672 3764 msedge.exe 79 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 4612 3764 msedge.exe 80 PID 3764 wrote to memory of 3364 3764 msedge.exe 81 PID 3764 wrote to memory of 3364 3764 msedge.exe 81 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82 PID 3764 wrote to memory of 356 3764 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://gofile.io1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff2ccc3cb8,0x7fff2ccc3cc8,0x7fff2ccc3cd82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,5700776019281703680,16728752517247874635,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e8baaf6c583536c9e6327e9d4fddb4cc
SHA10c1436d1a870038a6cb0195704658ef59ef78906
SHA2567cea1717ca57c727378be31a2046e1b4be05ceaff81e76d45b5b3fb1a0b09507
SHA5126cdb5d74ebf3c2f398c2032e6047f32b342db6f28f997c9c3df2351e307b316a6d66127a3ba6f0b1a721e5afd50a5578ec9835ea25708fcd49850ec4ba64dd67
-
Filesize
152B
MD55332d65d7c50eee952b71eda55782f27
SHA19039a05b96d6f5fc532a4ddb304ec01aa2fe5879
SHA256b677f0eeb2f0c049f48cc35d484ead2ba5434a74e4264e64d7f426fe45f2ff0e
SHA512eeff99092be3b0bcf81e9ba0f2a72d592938ef90952e533f903707d1e0af2138db62a4b491476f499a0909bf52fc7aada7aa832c73aa882d40f488afe5b29b27
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5ddd202c086711b3665c38d03c90e48c1
SHA1ed6699be7f4c3e794f116549c08332c4da8a0ba1
SHA2566d860c7fa230bc80519417a9e15ae9353154e9e6d114959cb4469f85675dcd60
SHA51293a9f6f74b6f4feebbf454be8b052984496a80cbc262dfb14653e50c921bc4b190d9758328ed8da5390d71d59c13b328f22c1958815eb5be648755a02c088df8
-
Filesize
387B
MD550cdf9f6a4a7d1fc8db168015feb4eeb
SHA1bb6be94a1d6fceb6b5e085b1c3e2ea41ea2340c4
SHA256f12d55e8215395b79366be4afb2cec402b08ad4cd6fa3361a0b0011e47fa2307
SHA512ecf3802b9d2160dc312d8acee02fc930b892d5210c9a919ae781601b05c378768cf80e94dd304a382b49024a29b2c696bc513e11d2d45d2808d60c9304888abc
-
Filesize
5KB
MD5b02569bc45fcb88be35d819e82733e39
SHA16b7bc286a9209799018948c4f4bb976115a07e85
SHA256cd00abedee28fb728e76d0d8e7411080389e1698bfb53c5ab112a356346a61c2
SHA51213287b11369dbde45ffa32a596b4cacf1081a482f48a8feb3059d3242df19f0b71f275cb2ca58bf0788479ddc00abfa9801cb94a36f7c9560b13b18bda07350d
-
Filesize
6KB
MD5f34d067d7931d1e6e2fcf9896d293692
SHA1a3edf6abee95348698a38e86fc28823d10fc2afc
SHA2562d328b3c1ce7cd6fd0e9cc08de1e9d992bbd828e2fb6619dfe15b96e6e753080
SHA51241e098604ea2f7f7250d260ed0489e8f5a3e860b064977a0d7a9a0e4cc46aa106cfdb7390f9f718b46029742137fcdd77f8542ccb0f9ec936a562feb133ca8f1
-
Filesize
6KB
MD50940a9a3756587022e5a2c81eb29b985
SHA198f375363e98897178a50ad18e36e38828be7b05
SHA256b6d1b0a7c4b78756ac57f87bf76d87b899541afbc6ab8daf19b0e726bd9f6fc4
SHA5127ff67a758ed7688ad374878c5cd4be01a5d73a5c637941a8e45cd53adf1a5f39142afd0b1fe9ee721e1e87b941e692120231f4d8e3fcf223fbbc78563742f7e7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD556544843f255c9522af3e6039420c7ab
SHA145cc5b8706422100be4a474a19cd63212940b60f
SHA256fb54e923ece862852b9eafa1bf980c33c6c234d83d8bae076f8f722b431c7a1d
SHA512f39b2840c47f4601c5c2d79b0d944f6997df802bcae93122852e12b32f4b2febd416a7e3629aa48a020b81da0f8c7b95c352b4a3febe74357261acd0346d9377
-
Filesize
11KB
MD5f58d61152db4194b0039ddf79dad4cb7
SHA193da607fb8df191707ae6f5b34ca32d298e74406
SHA256d27b86b44aba80c610cc0549ef48ac3c181105895e5ec6b52130029d2a8189de
SHA5120e820ed4485945a16b51e1227899ffc7dd834b94b139835697589fd3be9dbf9b8327946106b136f3e8df9d3246b9705960adaf4e3cb47ca94528b67aa3aeff16