Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 05:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1_pbCCTSJnLS8lg7krANehUs3kLuuHUgC/view
Resource
win10v2004-20240704-en
General
-
Target
https://drive.google.com/file/d/1_pbCCTSJnLS8lg7krANehUs3kLuuHUgC/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 1456 msedge.exe 1456 msedge.exe 4156 identity_helper.exe 4156 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2008 1456 msedge.exe 82 PID 1456 wrote to memory of 2008 1456 msedge.exe 82 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 3228 1456 msedge.exe 83 PID 1456 wrote to memory of 5060 1456 msedge.exe 84 PID 1456 wrote to memory of 5060 1456 msedge.exe 84 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85 PID 1456 wrote to memory of 2084 1456 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1_pbCCTSJnLS8lg7krANehUs3kLuuHUgC/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa512146f8,0x7ffa51214708,0x7ffa512147182⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,17962513537518586518,17860445867043268772,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f0f818d52a59eb6cf9c4dd2a1c844df9
SHA126afc4b28c0287274624690bd5bd4786cfe11d16
SHA25658c0beea55fecbeded2d2c593473149214df818be1e4e4a28c97171dc8179d61
SHA5127e8a1d3a6c8c9b0f1ac497e509e9edbe9e121df1df0147ce4421b8cf526ad238bd146868e177f9ce02e2d8f99cf7bb9ce7db4a582d487bbc921945211a977509
-
Filesize
152B
MD50331fa75ac7846bafcf885ea76d47447
SHA15a141ffda430e091153fefc4aa36317422ba28ae
SHA25664b4b2e791644fc04f164ecd13b8b9a3e62669896fb7907bf0a072bbeebaf74a
SHA512f8b960d38d73cf29ce17ea409ef6830cae99d7deafaf2ff59f8347120d81925ff16e38faaa0f7f4c39936472d05d1d131df2a8a383351f138c38afb21c1a60e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5e89eaeeef3cf76c69f24d12ccf69f3a0
SHA17ae37b660ccb1bfdc89770680ba83ffec1c287d1
SHA256c1b872f1f756b14e1fb17128a0b594fc051d483e59ebb6758c371380beb239ff
SHA5124a335e28917a229b11a96323d0981f274514b6467392baadf8647dd574c5e8ad35ea1f8b8bad97ce23ebb51629b7eca88e0c53e5399607490721a225af030c91
-
Filesize
3KB
MD51f1bccf8a5c587391a39088e5e91e80a
SHA1703d32085ae00e5cd7a2bed8d5da169f9194fc57
SHA256500fa17cfd2f3aa460dd9f4138a4a296e0cb5000f884dcbd58db2805616f2cfa
SHA51264df0dfd91592e02ec95462d7e094253f138fe802b8a107188a0e424cf2ea94e5d0cf5996ace1d3210e6f181b739f6139aa9db3482c9819db25e58fc831e209c
-
Filesize
3KB
MD55fa682678c5e12829d4fa44357a905d5
SHA1b57dcfad33f738c4ed3705a27e9347ca4db0ba84
SHA256d2ab6afe6c7c31ca212c300bf93dc7291f728f3f995387699c308ee9398b339d
SHA512b4e7d748e373c2d8055254b063308b753f4b63ec977efa21770b30c46612243a13ce3458262cb35c00bcb8276ca9a7105ec2f219f4ac996b10efeaea00545ac2
-
Filesize
6KB
MD5b2925db4c0b3c2ca9151ddd1ee197187
SHA1fa24327dc3549cf085cf792b473f9c3bf393f45c
SHA256fb97e37b674ea16ea115a774888cf1c5510242bc7f66aacd1e25fc546ca88c77
SHA512fe3aa00bc7646e9d091789b7435ee4b5f874906024276239bcd93f48fff7273d26bbd186d3993b45625103ac109a27bee61af28fb80a4ef00860ae4efedd964f
-
Filesize
6KB
MD5c59f6f7b3facef388ae41d748c86d413
SHA1f9b2a9f9a864c91b030d2960bbb894aff567f771
SHA256da188fd69aa170b3336153129f3f88d6db94837441dd7cf05c909444c984f64d
SHA512b604302a5fe0ec15dd8eb6d6a72ec13ea5d0ef68a8e1a79d6ecfee6ca76733d955243c40c9ded550911cafe241387636e564017af80c231e738b5c5a16dea661
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50fc9e8efa5bac9c95525d94855ec455c
SHA1e83e8c21aa28260a7c58f7de2ad750bee5348616
SHA25633d6328f8acdd8931b5f256d4b531a7dac8e3eba9d5df60e779d4e319237be12
SHA51294cc68d0718e691a83c65ff31d85884416e977887864b1b90a4e7d91c92725ed437db8aac352082d44d1d087e7d5bc559986e27bba5af089f1d387e42a24e109