Analysis
-
max time kernel
78s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 08:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1VdkncjSzL-81IUFIlVpQ39i11yip28qb/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1VdkncjSzL-81IUFIlVpQ39i11yip28qb/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3760 msedge.exe 3760 msedge.exe 3192 identity_helper.exe 3192 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3760 wrote to memory of 2100 3760 msedge.exe 82 PID 3760 wrote to memory of 2100 3760 msedge.exe 82 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 1268 3760 msedge.exe 84 PID 3760 wrote to memory of 3904 3760 msedge.exe 85 PID 3760 wrote to memory of 3904 3760 msedge.exe 85 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86 PID 3760 wrote to memory of 4328 3760 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1VdkncjSzL-81IUFIlVpQ39i11yip28qb/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb75e646f8,0x7ffb75e64708,0x7ffb75e647182⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,10061055878673262451,1840869957519120482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD50cf4ce105d3145919e0b8c3c7d8f4416
SHA115aa3a5954d395f2863f2985da128f803b2f3fa6
SHA256bb5fdb14b1e720011e8ec38a34b6a740e54ffb7342d50b7c1a0f1513c7f0141a
SHA5121eb229bdc8bb3519a3db3fb081f6aee25fe65bbad7a4033682b36277dda1501a9e27c1f28ac8f2961055abed066dcb2965369f45e7a2456523ea627c597ef6a2
-
Filesize
3KB
MD51258e4ebfb2fb132a7b805a9fd2789d2
SHA17a6f3316bdbf5d862519bcdba9934bf2f0af0607
SHA2567d2da5d90039e34f540e45e11020662dc5d2410199ec30f64746d8b8e700e32e
SHA5123d0e90bc504b148af43b7507554ffdf56700d8b7c995812ec0324deb14432fa330224e3ab327ae595c5de75cff20a430a8611dab19ea098cdb5e89e888b7206d
-
Filesize
6KB
MD5024ef8062a14145eb9a8704f23dfe7cc
SHA15d2509cabdd2517cc99201e4c15edd3891aab309
SHA256da046622781bf66ed8475b3330a296ff102d26ecfa2d7b97ca6f976f6e620023
SHA512de89a9fb4fdf81cf0f1e7fe78edf980cc2e0511a23919bac552a004fd7ab9956479282328639dd60b2746080f6a0d702ef441b6fa6c7baeb935cfaa449a544c3
-
Filesize
6KB
MD5fb03e1aacc326964506a23b5aa3ba5fc
SHA1d6e084eb22805983c2d817006ebb3cd40b9c7d25
SHA256d271485ae8965c6b06ffeca331139178cb806f04fdbbd1e49c27750b035a2f6e
SHA51268460a9b9598ed506d3cb13f2745eed79b45ffe029c05ebc8f972cc7f029bfd9e119aebe755c798473b4daef23084bb9abfc07a151d480d861d8ecc81fad4a37
-
Filesize
6KB
MD509a807e5d737b32377585c41bd5636fb
SHA115e4b6b6b12fc98e772d67a2ae4681210d795f1c
SHA2561888ee2fe875cebc320af18cab164401ab7807451eb740e19b2cdd7f5f522415
SHA512fe346f53293dd67920608bcdc07064e0a198d75653d45b20f2ca4e2851ec16bc30161724379fff5daef03b731eb03ab5d04145113dfa76aad2c3c90ddbfe404b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5100bc4bbbbece585429b5a1430fc2f96
SHA12d6a346ff45c8393014c52b79d102c7b75c771fe
SHA25650ab4a482831095f94d3992761a4fddef868c5b0f44948a53ad25b1990d53eaa
SHA51279d1b04f970d7def72249707db14d27a9dc0c4bffd0e165c4dcd4a5b87734a9442dcb3668d9a84e9805f315b7d5ecc28159744db3ef0ab351a44161612ac7f58
-
Filesize
10KB
MD5a0104568285c444f81868654348d6251
SHA1b92b6d7d634a7b23c68ee1e2a535ef80ec90f701
SHA256fb6172f800d79a93a554c444d97cc74ff00b4783ee9a4f70a68714582ef532e8
SHA5128e5f1f8fc233618b735ef870a5efcf1344f95f1c5a8d5b43158ed81ba66f5562a5dc5eec725c733a401360f50236271e27ff52fa3b61a999efe2021599f2880b