Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2023, 07:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&confirm=no_antivirus&id=1AvQduz_m2q_omNTKJ8lznyuM4jQu7LZc
Resource
win10v2004-20231020-en
General
-
Target
https://drive.google.com/uc?export=download&confirm=no_antivirus&id=1AvQduz_m2q_omNTKJ8lznyuM4jQu7LZc
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 2900 msedge.exe 2900 msedge.exe 3508 identity_helper.exe 3508 identity_helper.exe 1904 msedge.exe 1904 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2816 2900 msedge.exe 40 PID 2900 wrote to memory of 2816 2900 msedge.exe 40 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1404 2900 msedge.exe 84 PID 2900 wrote to memory of 1124 2900 msedge.exe 85 PID 2900 wrote to memory of 1124 2900 msedge.exe 85 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86 PID 2900 wrote to memory of 2188 2900 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/uc?export=download&confirm=no_antivirus&id=1AvQduz_m2q_omNTKJ8lznyuM4jQu7LZc1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7a6346f8,0x7ffe7a634708,0x7ffe7a6347182⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3088 /prefetch:82⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,9567592318176658055,4162670362839533636,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dded92ec95cf9f22410bdeac841a00d
SHA183c32c23d53c59d654868f0b2a5c6be0a46249c2
SHA2561840d5c60c79874359414677662439087173c575d814c07ebe661ae1cebb639e
SHA512e13df653c0364be2b61619fe3d46799e10a565b41f33d3ce15e50397f8f9aa328e8c821212efe10cfe3b8283c1e8c7e9eb15f9674fc456837d6ee8c38bc8b0d8
-
Filesize
520B
MD52d44c4ce1c1be60a2a094cfebc956e5f
SHA10b0deed3774348369cdedbd8bcdbe18960f27df7
SHA256f435cbb9e039afc2531901bd7786f803c2dbd8adf54dfdac2c8198ac6ee5bcd7
SHA512ce752d28ad9d088dd4a7dec48cbe4f466a143ef9b7ae493ad85937466c361747d800b1d96520629d162967167721faea710e37ed8bc80507654998e4e574601b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD53061a3ef0478292a7d2c5644ed2c752a
SHA1c978aa00d6f7ce5cf7e17699d3d98941bdc11f7b
SHA25628039382c57d7980dd14b528568f070394c0e768e460ceae32f1985be1dc6023
SHA512ff29cf380dd9159a634562df48506f4c99a66c57fc317d68bc2f678ed0a09b92050340842a263e39ab48a82f36d2db82d95667024a69267e1430330309165b3d
-
Filesize
5KB
MD5102478755348fe0357aaa824da111c7e
SHA13a6e0110b9fdfda78710046e91615199c3884247
SHA256251cc79e8fdb3424ae407cc9f0c06197a1374f864e69d3f3a06912cb0e497f8d
SHA512365af19381b6b9edb0455e207e4046a4db4e73d546732b1ed7e34990a1fd4a023d2f8c7fb4195cd9839466ba9a06ae0aafb363e8d894505cbd9bc4726793b1a0
-
Filesize
5KB
MD58b19970268a015f34d0d1ce3a2b68722
SHA1c7f1ed7f5549dee532270b2da89aa6af76343706
SHA25676f32c7f7e0483d559de8b2bbca7da1bf07783b2df7a9eff53389ddcbd50a6ec
SHA5128a63f42b925b0026848d21ca8545ebde7eeae0f2b3f57a4a7de146cc2e27ffa449f9c355ede891573b8e820e6c1e9efa6d2079c63b7581623d4513790926d725
-
Filesize
24KB
MD5e05436aebb117e9919978ca32bbcefd9
SHA197b2af055317952ce42308ea69b82301320eb962
SHA256cc9bd0953e70356e31a957ad9a9b1926f5e2a9f6a297cdef303ac693a2a86b7f
SHA51211328e9514ffaa3c1eab84fae06595d75c8503bd5601adfd806182d46065752885a871b738439b356d1bb2c1ac71fc81e9d46bd2d0daa1b2ba0f40543bf952b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5541f751d5577c572bc41592887e63aa8
SHA139ddf3f0843af6bb2df5c3e7cc6b7b1550105f25
SHA2560d488718950c973a22d6bd96ad10aadaa10982aca817563c5dae190bd1655a4e
SHA512663294bd2f03d485752fdab62caf77d4d502da101b0dec3db8ba3975c7fdb9c92972122e0b8d35a2cbd7ecf4932927d4b93d36aa457bafab6ccbfbe703513e07
-
Filesize
1.1MB
MD58d46e2da1bde73e8e5a62056db990159
SHA132e995a81f4c4353da7f690ac9911a7eaf3717ff
SHA25622b1ff2280ab146defae6b7fd8a66b1f760b47dd0ba19ec4d0d57d9136b0e1bd
SHA512e1b3ca5d879b897eb2e4fc40817ed8ec4e7fa6a107eec531cdba89bc8abee00c4523b53e4d9aa76037d409092bbbc4a90d507d10c25a5abea9e60c85909d1c49