Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
Drives.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Drives.exe
Resource
win10v2004-20240508-en
General
-
Target
Drives.exe
-
Size
98KB
-
MD5
f2511c5d9f605b9b65df1f61fd721dc5
-
SHA1
7febb0e6d1f389f9b1f96e5cf73c404eb904100e
-
SHA256
2513c9d51c454122b7038c444d44b88840b405fb4b0ec2be41eb48232e0878af
-
SHA512
0cd12d236750cc7d04940a5f83537742eb3a2becd6e5f2875c06137ebcf90a83c1f218e8f59db5e6c1bd12e647d1d757a79e861b2b4c2161f13864ea788f8297
-
SSDEEP
1536:S8hrA+e8LqjsgExLhIGZcgFq5LZ7qKw1hA4a:S4A+e8Lqo/xLdVFq517qKchA4
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 discord.com 23 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2539840389-1261165778-1087677076-1000\{E4A78A0D-4F9A-4ABE-96E9-5E94F330B6C4} msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 5092 msedge.exe 5092 msedge.exe 748 identity_helper.exe 748 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2144 4860 Drives.exe 83 PID 4860 wrote to memory of 2144 4860 Drives.exe 83 PID 2144 wrote to memory of 1856 2144 cmd.exe 84 PID 2144 wrote to memory of 1856 2144 cmd.exe 84 PID 4860 wrote to memory of 3376 4860 Drives.exe 93 PID 4860 wrote to memory of 3376 4860 Drives.exe 93 PID 3376 wrote to memory of 3244 3376 msedge.exe 94 PID 3376 wrote to memory of 3244 3376 msedge.exe 94 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 4852 3376 msedge.exe 95 PID 3376 wrote to memory of 3468 3376 msedge.exe 96 PID 3376 wrote to memory of 3468 3376 msedge.exe 96 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97 PID 3376 wrote to memory of 336 3376 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Drives.exe"C:\Users\Admin\AppData\Local\Temp\Drives.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c getmac>GuiKeyChoQuyen.txt2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\getmac.exegetmac3⤵PID:1856
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/invite/jjQ2KApzp32⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0ed646f8,0x7ffa0ed64708,0x7ffa0ed647183⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:83⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:13⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:13⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:13⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4796 /prefetch:83⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4820 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:83⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:13⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:13⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:13⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15227386087849529948,13073865867969432263,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:13⤵PID:4560
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD579e4e9d618ae8d42e3514f09ad4f64dc
SHA109a06ca019c730cba187c46f375df9a69abe090e
SHA256fd51a07e74e92b17f4751b57c6aeee925907a1ae248a85ecaa13f9e12071379e
SHA5120fe7580d3d6433fca94432d061c4ba459d42425f8287d486a986f3cb4d81066a815de5e86d44c1ec1ca9b7969afcfbae9ffa9d41075430f106607e4725e3a96b
-
Filesize
255B
MD5ff9f825925f89085b6c4809612c14b39
SHA13cd291d4b9d7bfff93177f074aa75d7034ce0d4e
SHA256118d159f05b7fb0b7424c2374470d9e77857047f4a0663e944e2363ecf04b0fa
SHA512735ec4fd0c01534dd09a61b341ed00a0bbb7488c1e267d736041d96e0f6a62c8b4090ded41986464cf82b472831c6d10f9fbf688e20340f6c293ba5332e05d58
-
Filesize
5KB
MD579cb85ea7bb2f2a4d02c9d76b1eb15e1
SHA11b3362ad911e8c6224b1700172cbc204943d7566
SHA2560ae7ee3c70f36e29a21c2d4bff955a25e7079bac62f7f0b2b073d97ae75d0e64
SHA512c8a1a93ef7f32818aa477ea1b7aad743b7f03a02f9b601cfd0a3749e0bd050f97227835aee7a7489746485f8f782b7b6831356a8307d2f1a7a4ca328cb02c53e
-
Filesize
6KB
MD58d3ec2f3f84f1d86132701ee3a26109e
SHA19e6ef642a444c77b2daad7639ad2710e11c9721c
SHA256b9cfc4a64d953e149a3b9aa371655fcf351486eff791227c33f0e00cf0c057fe
SHA5122ea39408e61d526a686b652e2a362c07f3cbbbe51bcada13e98c67630485d8b73c81c6776b3b9b059470bdc156d5b8977bd1b5ee0df43922609ac93b75d143f5
-
Filesize
6KB
MD5d4fb1c63faabbe2b07f6f718f98c0ccb
SHA18fbeebbfe5da4f197b73548d2ab2c1699c9b96b8
SHA2565c22c010880699d163109675ca74ca60b8996693e23f9ca00b3062960ec23f5a
SHA512e12abc9bc50731b3c8757e447fc2768f9e73c7690ff5cb8ae7270e88590e70802b6c82b1cf54d835adec22cb3173cc421b81307ad6627df9a5a0de1ff84e653e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f473b2adff37cf30ad007b639439972a
SHA1d5855fb1c63369f7302c392baa649dd048c30b7a
SHA256b15acecfbf4ca95dd5f987f23c71dbff7be0a5bead1a12b9c1bf006138d17756
SHA512a7258ee4217a484faf6a93a93765a8a1e05a3432149aff4b2da99e4ff61d9d2654f4d059aa627d229b8e725275175168d13a2ed92e2c483a7a4eb101ba18033a
-
Filesize
11KB
MD5ed5b7b7e64747dc40b406df357515d9f
SHA130771c0e3891d8f3d932b8d03613fe883123349a
SHA256199ce1e733b4770d1d6946157c314122e40dfd4f534d76567e2f20c740481a9f
SHA5122b8b389db2a385a37cd94f5c314829062421d179012ca2b81e912d9c173d41e1ad7254f32c6722840ae0008c53a70fc20542e5c4e26239881e4ffd80fb69a049
-
Filesize
242B
MD5aad0db38433a15070b0cb18ec3b28034
SHA1f5e4d94d1e3e23520003ad134cf0d145b8513fcf
SHA2566d28e059a0997355fce3c022d8a55085f36aaea7e1f39e536059986fe771a9d2
SHA5121ac6d84699cf3e472bfc9b345fe5b279a68fd4cb5808f16c7d3caffeefe030862c80d4bc3ca4fcd4ef550b57f4b2d4d9d6f9acd839c5f71dffb4f93d93f55f34