Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 17:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1fKrAUqI0gEgby_WCw63PL3fDHoZTnsbf/view?usp=sharing
Resource
win10v2004-20240709-en
General
-
Target
https://drive.google.com/file/d/1fKrAUqI0gEgby_WCw63PL3fDHoZTnsbf/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 3588 msedge.exe 3588 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4968 3588 msedge.exe 83 PID 3588 wrote to memory of 4968 3588 msedge.exe 83 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 4108 3588 msedge.exe 84 PID 3588 wrote to memory of 2912 3588 msedge.exe 85 PID 3588 wrote to memory of 2912 3588 msedge.exe 85 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86 PID 3588 wrote to memory of 60 3588 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1fKrAUqI0gEgby_WCw63PL3fDHoZTnsbf/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff314746f8,0x7fff31474708,0x7fff314747182⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4412 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11804634003665060297,3775432253786609303,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD52dfc5c53567da4f46fa49ea69fed09ab
SHA1ff5b6b55ca3334fdb34a5ca3078d27765ebb312f
SHA25635678ed2e481048474bac650ec796b19158fe4fae07bbfe24123fb2ef80b146b
SHA5123de4e459dcbd78eb0b775ccf8e30b025c5c5d8340afa2f3fb5a8a65df4f03b01c55058f99b87c97e3f4268ce7f5de9dc88ada31261cc3b682cdcf36f7d276295
-
Filesize
3KB
MD5e12e02dcb4e15afdce0d28f078b66ccb
SHA135be01e80cae62e0e7c63c209cd2c599533073e0
SHA2563f185f177671ec0c1f48edc032d986f163c00c593f0b7ee5d1b9ee87f3ada5c6
SHA51296ccd6c0bb500f95065fa1a40500bff4443ff37054ac8edf6ef11320238a114fd2f003c4e5abc8232ae3e930ad67652e791f6aedf5e67a4ee88c930a970ad2e4
-
Filesize
3KB
MD502f689383808d5c9388a4f726132a4c6
SHA1783c6c421f11c42cde65da03351b1bcb0f99cd4f
SHA2569813650f31c3ab0f0ca5344baee65474865fe4d4a92c60c4799a732cb815046c
SHA5127a9255abd35706eb3e7a8147ef4882317a7e6fd6c4607abce21ea7b265035a73d3ab23b3ad5e2b3a1ed255b5b01209e5f7eed51454a9bf0b3ea725c85d9cc56a
-
Filesize
5KB
MD597e8010328abf27fcae6fc1ed9fca9c2
SHA18600c56d0ba09a2ed29072d54ea4aec988a92463
SHA25683dc8f9126635fae1e4c3ab11577340e4a01d01f9af4fc5ba3ba8f185ba9435d
SHA512dc85b770dd0912f455e27af0f656935b06f78e519eb114669745dea5cbb1f201825afd40b019ce701f9d1b310b7f2168512996b16f5537987928dab021c5e524
-
Filesize
6KB
MD5e3d4be5266d0c0952b3dd3682fc9cf74
SHA11955633a250d57c63a3f8018083c8155d072fb7e
SHA25681c0d205e8d9e960a61f46f8c15f6343ddea59e3aba8f81f9ef97c1631874d8d
SHA512122535c61c1405e407acfdfb56f28ca45741a6473f32920a0b9e0f3fc0341c6cce7776d0c868807cf6646dae3c8223d3fce076852c892357daf6cb66eda99ed0
-
Filesize
6KB
MD50f1e5070b912a8018ac240357f574236
SHA1458bde849f5c693b932e78742e0ae5df3909ae28
SHA2568e8e94d514a00b1c6915e895e1a9b3d9b52d70630698e09a7d290a33f350a0da
SHA5124da7f7ed9beb6f6c9d436f95f67ede42a912c7407ba3fb133f2173bbc8a0692e31086089511c95df360343a8e5aa324b8bf035fa059b10962f01c99f55a47415
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5f36e48c835932424e6f431a2ea5c0c72
SHA1eabfede6b33286da2983c722e8d3b71ec0c94afe
SHA25633f4796a6d58f446e6701c5f4c782f4011f70404584a85f5357b0ae9882b27b0
SHA512a04c67c9ecf5107643e6e8f5c27c1599a1deabc5d5269acf8daf813113168297da680b1016cc0e8694bf36f972f51f797c3c3be711a97f660d01f5faa3f4de7f