Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-08-2024 03:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1FGw1qQ8Lwyl9RMcwKf8W_snbPNLldEyZ/view?usp=sharing
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/1FGw1qQ8Lwyl9RMcwKf8W_snbPNLldEyZ/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 2040 msedge.exe 2040 msedge.exe 1276 msedge.exe 1276 msedge.exe 3372 identity_helper.exe 3372 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 756 2040 msedge.exe 81 PID 2040 wrote to memory of 756 2040 msedge.exe 81 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 2188 2040 msedge.exe 83 PID 2040 wrote to memory of 1624 2040 msedge.exe 84 PID 2040 wrote to memory of 1624 2040 msedge.exe 84 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85 PID 2040 wrote to memory of 788 2040 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1FGw1qQ8Lwyl9RMcwKf8W_snbPNLldEyZ/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb4c7c3cb8,0x7ffb4c7c3cc8,0x7ffb4c7c3cd82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,3244180952905602409,11910950887050132728,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5026e0c65239e15ba609a874aeac2dc33
SHA1a75e1622bc647ab73ab3bb2809872c2730dcf2df
SHA256593f20dfb73d2b81a17bfcc1f246848080dfc96898a1a62c5ddca62105ed1292
SHA5129fb7644c87bdd3430700f42137154069badbf2b7a67e5ac6c364382bca8cba95136d460f49279b346703d4b4fd81087e884822a01a2a38901568a3c3e3387569
-
Filesize
152B
MD5228fefc98d7fb5b4e27c6abab1de7207
SHA1ada493791316e154a906ec2c83c412adf3a7061a
SHA256448d09169319374935a249b1fc76bcf2430b4e1436611f3c2f3331b6eafe55a2
SHA512fa74f1cc5da8db978a7a5b8c9ebff3cd433660db7e91ce03c44a1d543dd667a51659ba79270d3d783d52b9e45d76d0f9467458df1482ded72ea79c873b2a5e56
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD541f4692e7c4b034d4862e35d7eecfaea
SHA1708b781874a627b3b66114ddd8da30ad5c54f362
SHA256f1f21e278257922c8de9d0fee508d1cdd06ac92c9300e9dabcc496d6a8d848a9
SHA5128d7a6a93f0a7bfd0fdd2c74cd26719065598d39cfa9bef5bfb1114720d9b606ee27a01b82d43e2be40889718a4d9df4e6bc4c78d3452ac99f7227051f4f2ca3e
-
Filesize
3KB
MD59c8806982842c9d970c4f64eec84e2e7
SHA13d3ff957cfebfcc2176ccdaadf4ae3d22b810b1f
SHA25680af2d8c9d680791ffeaadf3aa281fb95eb9f8fb7581bec6eabc15b1379e8b59
SHA51229ef1945f99caf0f82150258ee6a4bd492fcae91bf26149d232e455a0e9f8d3cacd6e0fb37f2f96778e4c1f9ddecbebea0e2d5a69bc535cbbb707080bca75f6f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5a1fe693dc3674a794a4e0baf3b7f2170
SHA1b3b389fa59313922832cdac045886a485a4fafb0
SHA256a21d355086b50b0a53e3cac0d7c14560c2b9f929c65572e2bde820107fc0a29c
SHA5125d952ccc500af78ad5e9d68b6e3fce32980c642af3d5a359570a2130700732fccc9fed9300a80fb1d785aba76b1fd32d4f1dea7f917a06e1781a685647039b14
-
Filesize
5KB
MD5971b2e8e1e02bda51bb555957693a66f
SHA1511eca0efe6f589359bcf4c37a65a71f403aaf64
SHA2567cb453b6ad4bbca5db4758c32d94f48a60e27fbc1493867fe1e309294966a817
SHA512447e50d0dd5dd17c04e054a52d5222c5bda3f10fd09a3a2d8116ebb25385cf00d9ce85ae754d54542a55f13fd2a3ff9f306d2e63750c2f007fd7c680d6dbb3d8
-
Filesize
6KB
MD553044a4c32cc1854cc23677ac9af0a04
SHA112a0b69355eddfb272da5b80c3ebd7a6bf97c311
SHA25602dc2820d06a9da256c667a5a6840ebe88b76a46829e31e872b70b192ac3476b
SHA512a47ad3ca33bcf699c97b3cca6eab494c97ba08c398ef56d129aa85fd6f24c9b90292b209f7a1306cd4bce45a1a0bc94add8d9643a1fff19cfcc15cc43d5498bd
-
Filesize
6KB
MD571085b2d3ea2389417f5e7e7b50ece41
SHA1b83fd7f41664842167fcac3ebea82cdf4782c772
SHA256eee5373dc6cfdfd668c46c55e87f9f32ab3923fe2c2e69d8b4ba71174a5a2752
SHA5128ae417be67128517661083816d34e5ca436bd25e370a30b178cb936e1c32d3d7ec511e6b491da31d3747d1236d2b833c546b3b091b940132c17a75e0dbf8deec
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59c7a85d9166b314260d84e4e1a606df6
SHA1fa9a727f9f01a4356888055795743d7cde4dcc80
SHA256e2523550618e4adcf5c03a5a788f3f8d785d232748a022e98fb0e63fad99c043
SHA512fb119d1c9a2c7d1aebe61eaff2ddaafe34df612002564df823e357267473b76f24bc467de5aa5795cb6e320a9137ee2565ec0da77d562264a60188b327456ca9
-
Filesize
11KB
MD587cf3efa450e9a742bd1866f58b27ef7
SHA1a5bcd7c8c7b867f32674e5209d1d5e15fd2bd8ec
SHA256354005af46fdb84d71f1dab84d409612c870e4f2ecd784137733edb4df9c96ef
SHA512fade50fe9c8e7919517ed9f34c5b324b017b118e29c937ceff9db78439accbbc5ecda84bd450b5be93f37571bfd48431f364169396ad14c4c3aab2bd09b8a5f2