Analysis
-
max time kernel
50s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 17:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1d-Q0ZvbFayHIwZEP0RIr5GthxV8lDRme/view?usp=drive_web
Resource
win10v2004-20240730-en
General
-
Target
https://drive.google.com/file/d/1d-Q0ZvbFayHIwZEP0RIr5GthxV8lDRme/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 drive.google.com 5 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 287271.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 2480 msedge.exe 2480 msedge.exe 5076 identity_helper.exe 5076 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 4796 2480 msedge.exe 83 PID 2480 wrote to memory of 4796 2480 msedge.exe 83 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 1188 2480 msedge.exe 85 PID 2480 wrote to memory of 4568 2480 msedge.exe 86 PID 2480 wrote to memory of 4568 2480 msedge.exe 86 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87 PID 2480 wrote to memory of 1992 2480 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1d-Q0ZvbFayHIwZEP0RIr5GthxV8lDRme/view?usp=drive_web1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb72a046f8,0x7ffb72a04708,0x7ffb72a047182⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1058846470929508265,16697846111015693769,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6648 /prefetch:12⤵PID:1964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5336e632142966bb5b1555731fdae58b9
SHA1df21896206cb41e55caef4082b8d402435de5389
SHA256bf03fb88aee2f97c7757c4d05b84f3873ba82c16de2a537679f521bb42d2a3d8
SHA512f7cc58005811b16b1842307d473d379a0444269936ab2c0bbd58d827ad5383e0400e2a7e863f59215412a2f84924b1f8758b155b1b7eb83d045d1b6883c92173
-
Filesize
152B
MD5dd3fc896ff3b0d6ebf2ed72827fd3aa3
SHA18c8a9bcb355d3fddca81c5a0b7c85a094fbe9b5f
SHA2567d083e4431e3faf959c6c5f74d0319e5c7b199407b6a36c7adc980376e6da72e
SHA5125950639d09cd39676d2277efd11e4e21fcb6431cd67f7f2ba900def9d25fc4d56015ae2a0e32fa9f599e71f1ffd0f1b3981c57a30d73095915f975e783633619
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5bdfeeabac27d35417b4e4d5ae4ec0b80
SHA161c252bcc33ebae4cdb02a39f3b55b8bd4463240
SHA25691874e5e5d98e8a1e94f9f2fb592a0c397caca515f8f75f19c0ab60fd530534c
SHA512c1104e788c8e2a60269a33212095d5f4ef587b437e72b3440648eb75ac5b8e31edc87d66ac76f6ca75376cb9016a19a8bd9228b13ba5337ea0b32c87022b56c1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5023184d1f43cc15c3d673b738cf27e2a
SHA188cc3ead4a890ac3fffe08e4ff94580e2722b3e0
SHA25693f87ab50d4c7944bb196fdf468d01f405d0636b11446695857040af6630c60e
SHA51258597280dcbcc44df5461c2dc6633a84d5d8353772793bd166774ca37fbb25a7dee1fccfaed66a796a9fadb5bac77d2c6da8b711eed088ff8938960e0e63c431
-
Filesize
6KB
MD51a73dac6bb8e0e1d43687c70c2b3d9b6
SHA1b812c16c2bc4e1ca88d5ec0e3d44ce047ae84e7f
SHA2568db017d498128b40307893e273fee9284aac3377dff0f68ebcc03ae291c933f4
SHA512c38a553f968a657f2772194d960079112e1e68686948f8d8cafa7e6903043810d929570af42966c26101ae57e42174c28d558e452c8825148a882905eb98a6fe
-
Filesize
6KB
MD51357265ee55f41260243ddcffd7558d4
SHA11d1e54f80a06821278f10e51cfa3bef4771b8773
SHA25647fdb1b55515270a19bd97e2b67e16cab29e9ff25649025a596ab2a105127b90
SHA51271a0b5fda30beb68802d84685ed9ba0afd7b91ad2656dc888049005ff0236269cb0c07af6fe03e1edb364f3c2bd5e4ff5298aa5cdfa54cb63d363ca78e7c4e14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57567428e6f0b8a99164c25de6a8c576b
SHA132b8a3b1902e2c261a7a43415fe38a95ce842ee1
SHA256eab350290d0a6cecfe46271cd85a78540c21d0713154745a41f1ac0568beab00
SHA5128c8901d047ed8b080356054c30480ab1e0ebaee32ba9edb3f619ff79a09516a19df31cc6b3ac05858667e0aebbc7e79c08559f2cad0157a5bae7c3621444392c
-
Filesize
11KB
MD5e337fe6ffe143c5fbab0c075436ff842
SHA1cf9b579914fad1387900118b4f620fbca45c9359
SHA256af0c514f931eefbff265b260c4d10cc951c176610109c427c61189a51b4a0dee
SHA51269f9e4f861eefb5dca9d371ca24972f33fae1c8e94538346b355f35395d43b4ed9906bcfedbf41a3981bbf975344fbb2e9a13162d1ab267e381d1930f073ca32
-
Filesize
2.2MB
MD58e7c10567397acc61b18501bf8e8bfeb
SHA1c384a4edbf30feeff3396c7a6093bc308596cc0b
SHA2561cb4951eaa5ee6187460e61b129c2c15d30b364993a1e9b59d35529fcc2ce5f6
SHA512045502e8dc16fb267698645e59888a2503c53de5f5b5cfec834552dfb404c4333f2965319abed6dd56ba3349bb7429f54b99af9903dfbd18b6213b2b92e67ea1