Analysis
-
max time kernel
82s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 18:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/153arb4MoNfTHsIaaTKegCMTVFZwEbv31/view
Resource
win10v2004-20240709-en
General
-
Target
https://drive.google.com/file/d/153arb4MoNfTHsIaaTKegCMTVFZwEbv31/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe 4588 msedge.exe 4588 msedge.exe 1132 identity_helper.exe 1132 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2836 4588 msedge.exe 84 PID 4588 wrote to memory of 2836 4588 msedge.exe 84 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 2060 4588 msedge.exe 86 PID 4588 wrote to memory of 4348 4588 msedge.exe 87 PID 4588 wrote to memory of 4348 4588 msedge.exe 87 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88 PID 4588 wrote to memory of 3892 4588 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/153arb4MoNfTHsIaaTKegCMTVFZwEbv31/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab2ef46f8,0x7ffab2ef4708,0x7ffab2ef47182⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14853603417389872389,16013537652952310795,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:5764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5c9cf9cf85b0775067273dd38f326cccc
SHA1aa5b14848811ce1a9261a5d34f8de5723a5f0361
SHA2566b144e81162b8d19806b20e8e17035ec624ab01cd64921fd9f71ac7b77b0c5ce
SHA5124b1a9a42bc9ebf1293b4edc2deac8fa757515d1df98c293786b01d9a6454a9b42343bd497cb522719648ab92ba7caf3c4a1f682d89f9441a10c9d9daf85d9de4
-
Filesize
3KB
MD59cb2db3a0acba08655ca7cab9d68c338
SHA1d64b0b0f206832b3c0a68680715378b702e8c074
SHA2568522ae54ddaa23b0beead4864725a7c49409401a034f0f918dc2d67bc85f4ce6
SHA512a1beae64f461268da6662e4c91f8a9b7cbaf5989dd74778538b25bfaa7ea4e1449dc7a2bfbb7fc0f462320144639dea0d1029f79abbb357c3b5e5c332b014031
-
Filesize
5KB
MD502d97515a4ddad9cd25756dbecf8d5a7
SHA196118eebe8338cf7a6b48145d9263f1b9c4a25ac
SHA256a0482928766a7b8e1a6a36d35da6432ae8b1fadf11e25a28a2d79c9901db4199
SHA512552c753fc1a69dfa81762a09a4fa49a1ab9595e8f5f738e017cfa7488b7e67eb943babd2053248c4e3253c5b8c294453385e5d3dd2f2d97adfcdaa5a7c01e343
-
Filesize
6KB
MD5c531b8ee0c1b4c33bb57d6ef89e2e431
SHA120f42d9e9a5e4d0e811f751177124cabdf8e1b6b
SHA256f4677a51f1a735cb1c6bf2084687606c3249e5cf908b3c3a0a24de3ac7baaed3
SHA512228b91d08c7af4325a820613065ab0253c179fe5bf701c9f5d7a569053c009ae42449b08f129fe0c89f429a0eda0647892d8738534d2d9955dc23657856aba17
-
Filesize
6KB
MD547dddd9cbd34405c0cfda452efa22083
SHA17148711ab426331bec2b227fafc890c2a9613f05
SHA256b2fb510d0c5bd399056aad6cd428d4b0774c215a1844b35420eb61b16d938a37
SHA512ba0adbbeb0d5058639c4d185c434e1e58c63958ceb8eac87464348cef323cde4914a45c1581f558c46bb88a26032b4024144e9b649e677841534eaf4f97fb0b6
-
Filesize
6KB
MD59d215b7ac46fee005accf7a5d4a7bcc5
SHA1eea6874928990b537b1e78a06be6178119aaa2a9
SHA256490ec9b433aa9cb27a7b613be10b0264aec8180c4b029051deb09dbe0ea989eb
SHA5129e960dc138f27739a3f34168300d7c9a49fd0c63afb3ee303a8a82385bd9bfce1554b939f2ba3ae59f812fde6a2bc64613e55c29da3f99ec6a2fd0a45888f6dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54c0fedaa4020983f35b1ad6a59c51f33
SHA137aa3cb5b2d8eea5da78dc0ee0ed5b113b97b620
SHA256c261c484fb84858fd3bb658fcc9b07e8e7d772a69dda4e8fdaaf21c8410c11a0
SHA5120d2b300852cd002b479156e84c57506933b17ef13631ef641d6d26343c3d7a9e2d704dd7985993ce10574629e805fc2d0496b8d9c1687e4f861374e13aa42c18