Analysis
-
max time kernel
36s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?id=1FGuSAhMQWohE3xqCTTFp5PxDUnpGYiN5&export=download&authuser=0
Resource
win10v2004-20240508-en
General
-
Target
https://drive.google.com/uc?id=1FGuSAhMQWohE3xqCTTFp5PxDUnpGYiN5&export=download&authuser=0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 21 drive.google.com 22 drive.google.com 43 drive.google.com 46 drive.google.com 47 drive.google.com 3 drive.google.com 4 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608829913606168" msedge.exe -
Modifies registry class 2 IoCs
Processes:
msedge.exeOpenWith.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1181767204-2009306918-3718769404-1000\{E88EBC83-8E41-49FF-BFAF-86711333BF3C} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 3944 OpenWith.exe -
Suspicious use of SetWindowsHookEx 39 IoCs
Processes:
OpenWith.exepid process 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe 3944 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3480 wrote to memory of 3396 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 3396 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 4392 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 2556 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 2556 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe PID 3480 wrote to memory of 1896 3480 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/uc?id=1FGuSAhMQWohE3xqCTTFp5PxDUnpGYiN5&export=download&authuser=01⤵PID:4992
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4152,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=3744 /prefetch:11⤵PID:2524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4052,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=3400 /prefetch:11⤵PID:832
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5284,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5300 /prefetch:81⤵PID:4628
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5304,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=5480 /prefetch:81⤵PID:212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --field-trial-handle=5876,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6028 /prefetch:81⤵PID:936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5292,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:11⤵PID:3808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6376,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:81⤵PID:4992
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.118 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.80 --initial-client-data=0x238,0x23c,0x240,0x234,0x260,0x7fffde21ceb8,0x7fffde21cec4,0x7fffde21ced02⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2148,i,3321329112699294268,17939934778710106967,262144 --variations-seed-version --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1940,i,3321329112699294268,17939934778710106967,262144 --variations-seed-version --mojo-platform-channel-handle=1984 /prefetch:32⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2412,i,3321329112699294268,17939934778710106967,262144 --variations-seed-version --mojo-platform-channel-handle=3436 /prefetch:82⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4392,i,3321329112699294268,17939934778710106967,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4392,i,3321329112699294268,17939934778710106967,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:82⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\elevation_service.exe"1⤵PID:4648
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5fe578d554e835db8c7785795a4307485
SHA192cfb01bdbb27848f993084ba6af210aab0820a2
SHA2562ed8d83b29f77fe53df274c27026ea190664b8ac36ef8090fc5564dad5097c13
SHA5125208fedb5effbbdf2330d4d0195bf1b9ad839a1cdd991bf94d8cb62b48ca2b2ea9e8e73cb4c8226f03fc3af72442b6395e6f6756db6385ad40fb7c92510e582f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
10KB
MD5a21aa3e6cc98b8f628c62da95d0b4bad
SHA14841389a5b72eb5a64068033b90d1b7a6c7d39a0
SHA25601423cc89535fb5040c5d1f2ae064505c5d7731367395e2ad29a275e77df1737
SHA512b6a7a8cf5af34c96db58ca0e4da44834847e0c4c431e1540886536087f2a3259ce03832119ff80402700a89723f1a37d8af00ec8c828eee11b4e00b1cb538b99
-
Filesize
30KB
MD5e6a8c51c808de286845a1c56f39d6e88
SHA107a21d9ec39e2fdf83a005b55176cd85b0a93e69
SHA2569c01717d7569c8faa2f0bbd0e6271640fbb581851e08fb9f39ead1c594fdafcf
SHA512321bf64b0b1b85fda50ad9dda6719fa586b28610d879061d188ed03590b38485d614f251fa746ec70e04b5788816e22b249374eecaaf3e06a9ca79585f6187c5
-
Filesize
52KB
MD50ce33020c21067bf970ade4f777ea885
SHA1a05cb68ff2d915ae1ee3915f83fcc150f1e9e93b
SHA256b347e21d4343b78813f1f1ba41dc9ec25d144d8b36bf5349047aef6f3839c6cb
SHA512345a05d220254a6ca9d8c8bdbee840e97e1736f48986583daa3c6c49db979789b7598cd74346758cd6575440104c529b736b1368e0cd739c1a1fdb9036a0a169
-
Filesize
52KB
MD547f351a61485b6a33baaff9835c720e7
SHA10421fda3fa4c33635513d98c37e9581a19851c26
SHA256dedd7121041f0a99b32277ad0ba51cae0c38f1127f83c0693e5dc8464fc83004
SHA5123316a457133a3a48ec9988d0c6148494a535ef989db9a88aa9745174c7cb02e14a3b6eb8497bc1cf460efbdecdfb4dcdb885b6c11515133404d2ff51e90d92bc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e