Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
Drives.exe
Resource
win10v2004-20240419-en
General
-
Target
Drives.exe
-
Size
63KB
-
MD5
57bed442cd2367112845df9bb4f9a58c
-
SHA1
6ebca900747e4bcfc46b99177913925138d0e552
-
SHA256
cf02550b399950f6713ac6bf2ab3bff58a4cd457c59a80f17a17686ab6cc3358
-
SHA512
b9006b87a2b7ff6c6ee899019fe77a4b14ee21e16e2652920d29d51263fdd0f4de0aa3de8d0ed39f8aa30df7f6831f19394e14abbe73944842658893d291db45
-
SSDEEP
768:WV6WJND5WAeLG7qqad85bVRCOM4sOccoIfnGZ9AvBrOeNEcKbi9Cut0OshunUicr:e5DeLGqZ2B/a+GyrOoXIutCQWC
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 22 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3572 msedge.exe 3572 msedge.exe 2956 identity_helper.exe 2956 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2764 2564 Drives.exe 84 PID 2564 wrote to memory of 2764 2564 Drives.exe 84 PID 2764 wrote to memory of 4380 2764 cmd.exe 85 PID 2764 wrote to memory of 4380 2764 cmd.exe 85 PID 2564 wrote to memory of 3572 2564 Drives.exe 92 PID 2564 wrote to memory of 3572 2564 Drives.exe 92 PID 3572 wrote to memory of 3960 3572 msedge.exe 93 PID 3572 wrote to memory of 3960 3572 msedge.exe 93 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3948 3572 msedge.exe 94 PID 3572 wrote to memory of 3400 3572 msedge.exe 95 PID 3572 wrote to memory of 3400 3572 msedge.exe 95 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96 PID 3572 wrote to memory of 3208 3572 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Drives.exe"C:\Users\Admin\AppData\Local\Temp\Drives.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c getmac>GuiKeyChoQuyen.txt2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\getmac.exegetmac3⤵PID:4380
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/invite/jjQ2KApzp32⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6d6346f8,0x7fff6d634708,0x7fff6d6347183⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:23⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:83⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:13⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:13⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:13⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:13⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4248 /prefetch:83⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4248 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:13⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:13⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:13⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4713873134003929257,5908254275411772375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:13⤵PID:5052
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
6KB
MD55664072598b80bc53db5c20e9d915917
SHA1d95f080f9f6f91edabab7921801211b5da52267c
SHA2563966b701bda086d3137e7bc77eb3035f10766dba03eafb79e95e03149de4d260
SHA512b094ad1afa96aa25b44c9492d7a1e63399d1f6cac0379a5d428011989eb49ce4c2f4a98fec5b8503a356d87d21dd9c16068c74157417b88f458e4eb6bf1c32da
-
Filesize
6KB
MD5109634556e771d3a7993bb23e6858dd3
SHA17c3a18b41b628a21d7fc9c98f82a31893dbbce40
SHA256d6b3a487b5a7412651a96cff22c593a5426fccf0a00224358e02ccab9db309e0
SHA5120deb9a680b388fa9fc93a9929a3ac2409c6e66ddfcb471d5de5296a7480b69be312075c4f076b165557082bc7bc2a6bf26b6d9dd8d346d9f52516737b3935d36
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD59898965c9684c40de394e4dbf338b355
SHA119c0cb1871988e4737e6259a8759f71ccc70a62f
SHA2568fb61b0a1040c06effbd6bb3697bc65da20635675a47b4664176b6386d77528e
SHA51268cd4e4a07a4dc55e4c57f497fc32dd031d7e1632f01b94653ae8e9b45b053f4a9eb75ff58737db9764ea8fc0d38fe27b51807438204823f0b7480256b5c783f
-
Filesize
8KB
MD5bb428a7b02a99b40356a86d137cf88ea
SHA1c8e1e6373d40b1578b09aa98d5f8117ca841a5b6
SHA256b7a180cb10aa3a3b7c51e8a40858f9610e6616bd67ab2145deca10e9eed773cc
SHA512b1c4c6bbfca1885c877119a979d6cfe24fc167d10dcecb51dd4e9b5efbab567d9d75ce9dfc6695461c90bd8f94b60cd7cfa66a1fcdd5bbbfe8f4f254b6ee9683
-
Filesize
242B
MD55ae8e0316059af65cbb1a12d1a1612dc
SHA1071094e62eb5a1e5b647c1284aa11eeb5893048a
SHA256ef7a770e1e45dad3c676636529bcd115d727d4252c51090599a31ac42823a323
SHA512bc37942179f3fc1cce0bc7062c28e4e6df9f29f3ae4f0be8f1d1e46f387795ca59c3632d1f4feec12421b88f97ef9c2e46f348ac44ec22a7dfc012fe92ca2f76