Analysis
-
max time kernel
522s -
max time network
523s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 08:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1ptA4_lcjKP4R5o99mqI3OfNkJhvDzObD/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1ptA4_lcjKP4R5o99mqI3OfNkJhvDzObD/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 4552 msedge.exe 4552 msedge.exe 4308 identity_helper.exe 4308 identity_helper.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe 2284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4552 wrote to memory of 1144 4552 msedge.exe 83 PID 4552 wrote to memory of 1144 4552 msedge.exe 83 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3932 4552 msedge.exe 85 PID 4552 wrote to memory of 3528 4552 msedge.exe 86 PID 4552 wrote to memory of 3528 4552 msedge.exe 86 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87 PID 4552 wrote to memory of 3692 4552 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1ptA4_lcjKP4R5o99mqI3OfNkJhvDzObD/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc36fb46f8,0x7ffc36fb4708,0x7ffc36fb47182⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,16401571982580024524,12910610746414101080,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5f5fab8fd8e5bad2f4bf4fba7af382e7f
SHA1f6a4f90ff73ff1cf4ca77eb358325f6288410665
SHA256d1bf88afb6d406877fbdfca5909b24195acae57b959cc3fec4d5007c96208233
SHA5120ecc75821902c7d8549183f2444c598ebba2fb621fc1a3bee6595e5c07ac0cff914bf3408aaa7ade7f195c30745e8856d15a2cc9d0a7886762d7fe239bb480b5
-
Filesize
3KB
MD5298912a53c64aa0260af389519e26ab1
SHA11f8ffc4a872a920436fd40bd7d43cf3e1535e6fb
SHA256c0699eea28efea3577685a0a0a5c68af844606693cc2945698b220e30a6a7150
SHA51240ecfd58084c8fb931975d2254334196648a602d859d1b0aed531f06e08d21c016a1a2102f2167e52c91b2261a81c79e3f338d003ac78c629bb305e983d1d04a
-
Filesize
3KB
MD519c726859a71be341b4afe67fe5a4b2c
SHA1b2e2af3a7f90c31ac27f7908023a135998711d02
SHA256e283aa8dd681dd5f412067b32aba42708c5480aae666299ca931ab6278e2f190
SHA51287a183cd48cd9b91143f6895ba4e078e62ab4496199addf2197fc37f1f41df9fee40afc6a310992cd6fbd61b3833ab9bef2746975c5c593394f2f8e7bbcf4266
-
Filesize
3KB
MD53907f873c8152592ee14980aecf27798
SHA1790811dad38d280976edada16eacbd072060f6dc
SHA2567c9368f1273e45d7390a98b32b2f72d1070ac6d9b22f58e9cd0788a0b5c67c86
SHA5125345d6639764ed36f1d68049d585dc02c8b83fd14a5087efa41aab4a07fa4d828a9618fe7052e77d958a88c75a9fd6af6b5e2444abbd12e501ab054b3ebcf6dc
-
Filesize
3KB
MD52d9fa5985ea8399a22078bfa13f29321
SHA1821c77adf7783920073a0e64550e175131179d59
SHA256b9877cb53c689a236b4810ed9c7654a895f51fa6797e891e47737ff478ecefb1
SHA5124b756e76544c534a24c55383a918c0bbfb1872795ffd4cff3cc571a6445211e9f6d9537e5295669ef4e48f79cabec5314c9ec367b5747b268c52872c8d4e9b1a
-
Filesize
3KB
MD5c456e470ef011e86813cd26203b5ee67
SHA126665666b4cb6791c55c61634ca6281881f80376
SHA25685a01e299d96f79d015f21d3cabe6bc8d9041c887b30a1b66da96b81c0a8a489
SHA512efad38e3f621cdae42aabfe0341624192159a78d89a8c257a21f4a3a135a48f1799b3f23b7b36435a3defe1f961126e7c8d1bb9a8c5b40fd266159d15a032973
-
Filesize
3KB
MD5e5af14b1e9b219ae3ad5db8f7e592a02
SHA19214db68256bb0abf97aa2c642f1598deb3d9fdf
SHA256408c8957074ee1f57c3860e51d9e7ecf20b83357ff9ad01201762452d7fe4189
SHA51227de723a15c5f50d3f5273d4306883204366db5ea4c6b0982b3d44e54c5b61096eaa16337350eef6f3dc4930a43d6b8816164413f56a9b0af31d02e295706e0a
-
Filesize
6KB
MD50e6c746a4d81ee780054272bd4745e2f
SHA12bf383fe64c631c9ed0c9091313a0118d035413f
SHA2568935d26596245980edc3d847c53dd20c115ccb2d9324b00ba177bd14f75e711c
SHA512841c0445b1656da5f7df9f45e76f16a2982a0d64a027177174916db51e26c3266e536434ddaadefd6d5d67d2d764271e62954ca95031142c46de4e1591a8cbb7
-
Filesize
6KB
MD5a0764b558c5caa63eb903bdbc56d831b
SHA1b29689415cbf133fd9ae9dac95cd9b2e62fe984d
SHA2565da66d0b6b00bc497ec6b75d342e877061fda83ce94fbc5d0eca0943bda6366a
SHA5129b5661c22f4de203ebf70d10bcae199fa52f8c3af605094b332430246211ca7f4b3d322ab53563003696517864de8cc2bb1dcc4704178c9da9b51ba068230c58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD595748136dc514c702401ef34099256b7
SHA17e8c2dddddad89e489ff58cffa8a1ed0e9c166a4
SHA256a16311465f0b1c1f682069d7812f252625196aae0c8e037160c3139307f93fc1
SHA5122a1d79c9eb9c4bb934191c9ac9fbf6b3a247a32100b5bf66e79fef520e01b83b6be0c8e587276059c2f7dc318a2f66bb39011a2ced5bbefd54aeccd6513156ab