Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 18:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1TQfWqkEGu9dsLU8KFdZeIXGr3Ux4WZ0Z/view?usp=drivesdk
Resource
win10v2004-20240709-en
General
-
Target
https://drive.google.com/file/d/1TQfWqkEGu9dsLU8KFdZeIXGr3Ux4WZ0Z/view?usp=drivesdk
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4248 msedge.exe 4248 msedge.exe 4636 msedge.exe 4636 msedge.exe 2016 identity_helper.exe 2016 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 1104 4636 msedge.exe 84 PID 4636 wrote to memory of 1104 4636 msedge.exe 84 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 228 4636 msedge.exe 85 PID 4636 wrote to memory of 4248 4636 msedge.exe 86 PID 4636 wrote to memory of 4248 4636 msedge.exe 86 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87 PID 4636 wrote to memory of 4264 4636 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1TQfWqkEGu9dsLU8KFdZeIXGr3Ux4WZ0Z/view?usp=drivesdk1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8779546f8,0x7ff877954708,0x7ff8779547182⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,4416844197584968005,14472877487214509222,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5e64d221d1f1211bb7445f4754257f55a
SHA1921d711b7daffb3314b0bc73ddcdf12ed2013e85
SHA256d6f87668916c5a772d0447c2388eba5189457d14d38f40b71b4d2691f565785a
SHA51240f734ac09dd075951719e3cc149917eb0e8c1af414205e7eec0f7fd645c40be9b1176d75ca99dceccda72fbfeb370b811c3e652253fefc0e8e9b28e5272d636
-
Filesize
1KB
MD58f60ce25082c96b075099f474a6d7b3c
SHA1c2f25a32a9aa4bbecdb7b128a8cc747c0fc02b74
SHA25679cee82b001d2b8b1e7d936bb8d3ec2b22f13d8c67fc7802728130a6d5a7885a
SHA5127c47570d148632d26a551f9f157fe36466be231d05c04bd10aa271d50ef3446fbec4af704a84dd39b53aa0a1f327d25b89c75fd191796af1f398010a5ed2f124
-
Filesize
1KB
MD5e0d2e60c287801dcedc0969faacbc281
SHA16ef1f9902b395ee3465aac879afc479ce6ad9e6a
SHA25663ab048a03476758157a7e51cf7c825153ea9c8cf33ca863d7da03d8ea731590
SHA5122288df33dbb24d902b6ffd40d38ffa81a99c88eaab7301516b2d0e2e14efadae0653f55e8dd3d2efa1c0a39f2ed29c4d912aa0867ad7b492ece31c48aafbc3ab
-
Filesize
5KB
MD55191788eccff9032fbde372d2377648d
SHA12ef5497b1785760b2e24fd5b26705802caedf7f9
SHA256c983b5fe3441b7b4bed4f4d5bbcc26a69029d247d593ca2ccc055dcab6fa92b3
SHA5123e25bf1a4a928848ef2a88fe5424ad60f3f28bc054e224d34d74e33cae0af1922ab4b0d7940b1da72800bbda4c7d9948c8c448be12b11cfb174e86ab9277d026
-
Filesize
6KB
MD5494f4d97dd844b5a6e89a0f55638849a
SHA1887c0bfec235b7e9ddd383298af781d01a82d5d2
SHA256212431eac9821fc3b91dfc409e176ca5a37a254f6cbd8ea4553283783a7f94f9
SHA512440dc359cc81290510ddb93ea3139108340c736be8748ced40fd4fea4aacb23798568416d3680c2a666add21ffa6a33504d415c845c11c0cb8794fcfee714578
-
Filesize
203B
MD58f8008db5d592678c777e1d435fc504b
SHA1b37fba7c366a206dd5c329210dfde4dd2551b8b4
SHA256b31f6a760f1d2cf32dc2ee9eb64a73c2062be0fad942302220f72a9c7c8d04f9
SHA512a6fb3bf147aa617b465e685ba12c91e293809ecfd5bd4bdbc16a22aa24be393f1808a5da5d6c6c2665871c15b969faaefc165da722b7f0c16daed9944f78b1dc
-
Filesize
203B
MD562445dae03c7319bd5ed147757fdb176
SHA1c5dff6cb3072cb3af3e5e2929e5c71340385cea3
SHA2569a42ac9534e925ad03881c30250c4c3c2d33a088a1a92a17c0233800e3882a74
SHA5122421f0155d5a6d873c2080f0c0dfdc85d3867e2e55d9beb789aaec5d1ac4ee4b5be16124964ac56535e114c25923af8712dabf7ea72cf5518b91873f4292236c
-
Filesize
203B
MD547c88b45ed11ba579ac4cd91990df0c0
SHA10e16a577968165e3b5f58cbe1ee99ffefc8c4a36
SHA2560bb5c4920dffb607b1b093e64fc8691fa739b5f3e5eda56ae32ae421e47cd6f3
SHA5125d6d7c4e0482bdbbecf8aca29f320ce54d2f17963b0fd52ca1d36c7a8b6e2b1d33a37c42900212ac758b9514d0631e49ef9267b50a25ae088701178bad4d7652
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5fb49eeb90450d337dead7333b3d24902
SHA19a95e019b958b9e5986b6b23d87d31d4afaee678
SHA25609d5926f692e5a101327be9b77ffc15ce5257874b3a473d1522a130049699d12
SHA512c2c1a447562c82f20bfb839c7c38d0ea0de34e30d4072cb766c75c92377417f1f7c245a3b7cc8e19b8f0ed58e89c5f49e19a4047d77ce2aa2dfe838ec37a9868