Analysis
-
max time kernel
10s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 00:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.usercontent.google.com/u/0/uc?id=1fXGFBQnnQa0A8MLrEyqV6_nzzMsX3gYW&export=download
Resource
win10v2004-20240426-en
General
-
Target
https://drive.usercontent.google.com/u/0/uc?id=1fXGFBQnnQa0A8MLrEyqV6_nzzMsX3gYW&export=download
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 380 msedge.exe 380 msedge.exe 2792 msedge.exe 2792 msedge.exe 2324 identity_helper.exe 2324 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 380 wrote to memory of 1240 380 msedge.exe 83 PID 380 wrote to memory of 1240 380 msedge.exe 83 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 2264 380 msedge.exe 84 PID 380 wrote to memory of 4408 380 msedge.exe 85 PID 380 wrote to memory of 4408 380 msedge.exe 85 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86 PID 380 wrote to memory of 3456 380 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.usercontent.google.com/u/0/uc?id=1fXGFBQnnQa0A8MLrEyqV6_nzzMsX3gYW&export=download1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d6046f8,0x7ffe4d604708,0x7ffe4d6047182⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,17598177291492463765,5177386421770408150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD51cb729a929368d944857b72295cbd61e
SHA1419cf427ed36c07560aef04db766b4db8288f898
SHA256efc4cfbaae36b8823c4bf7c9a7524fe43b0ab61d1a99a8163ed5b9e5aa1e3cc2
SHA5124a0712a07d71916420fdf544314a961e3901973dd3b514ce546f9c0f2b7f63014cdc9ff181378dd428773eb080b2f044ea1b47c2a7e7895685af2c1fca1fd0db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53748a4bfbdbab0760aab9ff226c815bf
SHA1bac746154b91c78060c99a4db54b90bc2eb39a0d
SHA256dd7cec70c6a241c9b26411966044fc432d4b8688c4f615476b3a0745ea4c9574
SHA5126669d680ee1cf39d4d8099bac21ccbf71a4ec57da06bae6dee4b01e768b167a46b4360c8ba7f269e5a707252b126d2fec04f39fcbe72482f514b71acfec439d6
-
Filesize
5.4MB
MD5155d56c2b35cc71bd2c2bda1f0b473c9
SHA19ae633f2f1057562307028b1b73a8207398e09df
SHA256056ead769b4552a8ea05daf8ea44a756892b37b52f9c7af13dcd2c4d83eafb4f
SHA512cb7c6b59ca96a5e4b1d71b27eed44e469468a9f96ac7e35dfd4c73190235f5ea9273c212273528be6c61035c3ecf0cb71550ab0dc0029c4eec39ace0e446357d