Analysis
-
max time kernel
523s -
max time network
527s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 01:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1nyA3VVfGf65kiCFIkZDSIdU0mXteEHO7/view?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1nyA3VVfGf65kiCFIkZDSIdU0mXteEHO7/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 drive.google.com 7 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 408 msedge.exe 408 msedge.exe 3008 identity_helper.exe 3008 identity_helper.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 856 408 msedge.exe 83 PID 408 wrote to memory of 856 408 msedge.exe 83 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 4228 408 msedge.exe 84 PID 408 wrote to memory of 1072 408 msedge.exe 85 PID 408 wrote to memory of 1072 408 msedge.exe 85 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86 PID 408 wrote to memory of 5052 408 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1nyA3VVfGf65kiCFIkZDSIdU0mXteEHO7/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81fad46f8,0x7ff81fad4708,0x7ff81fad47182⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,9578032755809683928,18110613756141779438,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5772169715efc61695e6208b6a365d348
SHA172f6576dbd844ef8eb4a3839aa366cc21e613ad0
SHA25618168fe98da8e651cb05bc62562ce0d70c16c8d89af49f5f3e02a3ce37d88187
SHA5123f2a37cc9359bb459359f9b17659ff3b2f8bfb43f4dafeeb236d168c65338f1952c26ab974e81a469fd2bf8eb00fccc14932140609656d40de6240961b6487eb
-
Filesize
3KB
MD5109c6dbb68627ba84579e959236b3120
SHA1639c280162fa659d4042fd84ead5eeb629379716
SHA256e050871c9c0bfaf18db00bda00abc68152c3384550eb87b2bf326073e9cb3047
SHA5120bfbc7534d9f41e87e7cac6f579ea87b2314359521ecc70b4bc2851b4e5225058b8bc4c43b16a7da8e04344c08c62f7403fd12c01a75e1d24e1f83faf1455136
-
Filesize
3KB
MD53254e757d79c1ccfd8a1b138fba54ac2
SHA1651f9f1516ec508d1a9fcc3a073c5937b472d0f0
SHA256630fd3ada09f7d94c1a0e2287b68bc6ee440cbcd15d9e8d59adb8485e43998f8
SHA5125125a6b97660f83a8c5819c4cceb8b5ed79a27bcd6a54bc61153493fac608ab73fd7629c8b32903d437c6660d5660e04f2527f3b383fc47d64e029610ae6add6
-
Filesize
3KB
MD533165b779e2f4ff1d1b143b3d03466ca
SHA198d2a573bd0764ef50ecb479839768cfaf9ccfc0
SHA2563e2d794d54ebf447a7aadfc4957e2970a5d11bc4b56717541aa4391341652e91
SHA512770a75668cf8a42d330329f700e78fb043aa050f1ffd688fb28b46bd9e120d8bd8d3ddfc5222f4b901a659b599833dea021e34fc1a6ab4dff5a011cd24150533
-
Filesize
3KB
MD5b2339606e9cdde360bc0817275a23dc9
SHA16af0685d56b3c0754cca01dfe6228f1656f75e8a
SHA256dc4adf3dff8ce9d0fab4285d610f6fc32b597d22163cb4dc10ed536f6dae6a4e
SHA512d44ca1f7bd60b7c25cd9ba6186f4cbb362b5111ff5ca00b1b0c4b2d3ddec3ee8823d0151d678d9ebb451949e3abf89c6f4b31f7742854a4240b39767b3908ea0
-
Filesize
3KB
MD535ee1f0f6997b92c6dae52f89b057c1f
SHA172e1a492a296cb9fb376529f7ee5b9ec58c7777f
SHA2566b70cf4a2fcc99721e5ba46054203e20dd51e5b8f8b627d417b9db573a68f17c
SHA51286cc3f9a3e6151798ce63ddceb031adfe14838e7543927493199425794bd37361739bbf2dd2c1b4378aa7c69d9d2470beb4b71d7d7715a0bd0c3efb1fa90c3f2
-
Filesize
3KB
MD501aba7f8a85c82eb8b578ed7e63e561b
SHA1da4d143d065f2dd35c1630d4717043c6ca944c5c
SHA2563dcc3066aa302cc536cab7aac108010a5c4d388453e76ddb31c76eeb80fd80b0
SHA512351d48bda5a454477242a07fd9e79b8a62f616b632f3bdc6e886d938880f46e81ba755246ea4d5ef97a5a3388728c2f72a82a9b4ecfa4300c54558e2d974bf0d
-
Filesize
3KB
MD5846748b3e7fca090dd417fe6347cbede
SHA1bcd3e5133cc9abcdaf3a5d255ae678805d0782e9
SHA256d325a2e128cec996001781c591d26abd4f93a75f4fab05cc49a99ad19aef158b
SHA512ee085136ffa7744c93f9abd73bacf43db37a98c57515a32119798a0c79adbc7e087963973105d7adebac7c386662ea1378b8ff2ba1201d84160d68b01107edac
-
Filesize
6KB
MD51dd336880721d255fd1e404668051cec
SHA1c9c78365faa1c8e29402139cb6addc8f91c974e8
SHA2561ce70f1f659d0c689f890359dc85a2a2007a44ae48f3ecd01e717e0a5017560d
SHA512974cd43428dee5cf52ae5068975885dea43e1955336e746fe283fe8dafb436c67fb9cf9837829a2bf487a3172344e6649c63b954c72a7bb43052897963a11fd9
-
Filesize
6KB
MD5f15fc51f01541f9262474b5acc46770d
SHA1ee8913718636c69f966ee70e32e704ada4008cc5
SHA256443f21f1ca3f8aa2f8608000ffd6cfb3991ec4b4d7163d494b04bd8aa5f7a4e1
SHA51228e0254c8f083349bc0336efc08c88dc316ce7b0dfc085c6515b6b16499b851c4698baa5e94dc5c3ba8a33ea02c0c836ccfab4b90e1cb5bdda363f2fa4abb616
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54b17ae0f9458f4f13a26219daa0a6963
SHA1d8d49a817b7e0330f9562537eda6121d3d825ed7
SHA25638a81eb0635bcee64e2565edc3bc85503700fc8c731bd50566680fe94672436b
SHA512e110ac8a502b4fe1705c02815bca45220911e942d0169f5234d22b14e41bc8f6b4e5d8271d7a926afb6595ff2e140a9191c0293e68ca3bde105423f5c0b59d29