Analysis
-
max time kernel
33s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2024 14:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/14NQDFKkxq3YolkIbFeJQFQsfnmxPDePM/view
Resource
win10v2004-20240709-en
General
-
Target
https://drive.google.com/file/d/14NQDFKkxq3YolkIbFeJQFQsfnmxPDePM/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 2728 msedge.exe 2728 msedge.exe 2260 identity_helper.exe 2260 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 3184 2728 msedge.exe 84 PID 2728 wrote to memory of 3184 2728 msedge.exe 84 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 1608 2728 msedge.exe 85 PID 2728 wrote to memory of 4812 2728 msedge.exe 86 PID 2728 wrote to memory of 4812 2728 msedge.exe 86 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87 PID 2728 wrote to memory of 4280 2728 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/14NQDFKkxq3YolkIbFeJQFQsfnmxPDePM/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff911e946f8,0x7ff911e94708,0x7ff911e947182⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,8852504117577077824,5138116062147798712,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:5164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5abef91451cd9e6c7b7a837fdef29ff28
SHA1440b974657cf0619f1e01b4785a91517851eb133
SHA256db3da4ebd2abc42f54acd61d10025f4a48ed93cbb786ffc0363c7484019d555f
SHA512e7681e2da62fb03eb1858a07776ec273013c2888ad042fa0d4ff85adf96c2a5d47befee54f4babe6f204336c267114d8a80a5822223da785aec422dfae9df4e9
-
Filesize
6KB
MD598d64ee3b87f3d6d68a3b223ac3931b5
SHA1aa4753ca6586949200df7a1f9071d08b3ac66695
SHA2568a81b52b050d2281db140c4a7a6e544bba8dd158c116f92a4c15c656a3fd3c60
SHA51221241890d48f8af3500671fe4039dde13cb9ab2fb23f616f31b77edae68e86123d8cc76a35a55d14aada4c500cccff352e8a76e9a8e7083a72c577a71373b60b
-
Filesize
7KB
MD53cfb463a7916bd3139354a296001bfb6
SHA1859d9913a5c3abd6d4ecf2d1671f7eded427a9e7
SHA256bcf74e9edbc3b65bb14ac145b15c6645ab2cca9eb777fb1e0cc2dd4e2e73c8fe
SHA512d9a50330c30fd87b5120244b4f6c5db22c8a3d49eddc2bff2f4568bc3f870511af9b20269a52708522d20a2772078aa6ab3def57327c07c596352128efd025be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51d42ed0339e46673d6722a9b50cb37f2
SHA1baf87795e23d053b268f3d54d8d149c71f056124
SHA256028c52da26611882d7f69a5a6b4a5634303af6e81c6815466e4302b16c73a88b
SHA5123ce39a3538d92089056a0fb9fb1ebef775475cecf5311dc35ce81a022a0daa0f76561e6b231892c77b613c288958dc378eeb696dedb10ab5e978f43b4fb76b7d
-
Filesize
11KB
MD5294c01eeeef69eb2a1ca963d9ff25231
SHA11e00abe77948f387aa787f9d3ae1a9b5f28f6823
SHA256980bfcc60f21ba08b09bdedc066a64609006e24b9016cca0b335babf244a8953
SHA51225f94275663458cfc824fe2d34e14675d402db192636ce9fab6c2f88b899922ddeb0a9c5d5eb964f4b12fcfb05582ca1be965edc638bbfd7722e957bb3d4f58f