Analysis
-
max time kernel
292s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 01:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1jEeC1bznQ47765ugntyIhyHeou52oD6M/view?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1jEeC1bznQ47765ugntyIhyHeou52oD6M/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 3 drive.google.com 7 drive.google.com 8 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 3400 msedge.exe 3400 msedge.exe 636 identity_helper.exe 636 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3400 wrote to memory of 2924 3400 msedge.exe 83 PID 3400 wrote to memory of 2924 3400 msedge.exe 83 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2732 3400 msedge.exe 84 PID 3400 wrote to memory of 2916 3400 msedge.exe 85 PID 3400 wrote to memory of 2916 3400 msedge.exe 85 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86 PID 3400 wrote to memory of 1560 3400 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1jEeC1bznQ47765ugntyIhyHeou52oD6M/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0dc446f8,0x7fff0dc44708,0x7fff0dc447182⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17208446283535439178,14511215670627022808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD548cada3d6147ddec909675f7dc00f153
SHA13216011b4695fa88ec40bf3fb4d0273908c3c528
SHA2564629bb7411fc5e3e75480f848087fcca646ad895a2b8efecec2c4ad4b3613d23
SHA512b8cec64b2242e274e5086837803d24bf40831a26319db67ce5b034c1c2f20c752a94848852bf44a1bc5cbf1b3d42a102801f1044c295ff8b80ac4bbaf8efe5db
-
Filesize
3KB
MD59eaf32d0d00978d75c8f0277cff1b5bd
SHA101d332262d072ec3f3ef8f608548293d56a10b70
SHA2565c2e816b479d015e0b01493545f15fa4392b79212ab52ac33b8fd12ee386a795
SHA512c16fbb4e105e1e29e1ae154de0e5deeac4211cd3a6ac0cd3f19d3c94e331436eb952e717c74f3f3202c3289434273b0c9385fc27264e3aae96e90fedf0d7cfb2
-
Filesize
3KB
MD50404dcf51bdb851a79d0bbd7648ec566
SHA18599a6537829c676835d0ca91981c01389019a1c
SHA2564ee064000b9331d79f897f5e7c7ae591387b2348e5a0186e5d04a8e558dfb635
SHA5127b16d6f57e6c6fca00f08b68ca4d1ce42975a76f496cb827a4d71f91844cf7e7b8e0d9cb31bfb5cc3b328d99188f1ec810ec7678c5e394f808d399d6396f591c
-
Filesize
3KB
MD5e4e751b439c105da87181a3c588a9ccb
SHA118361991884222ad9361ac80623cb45bf317fe31
SHA256b3f219cbd015896973f4fa27d256908f78e4e5cf0107f1788e4ad0cdb9ebe3ee
SHA512173b0a87f6c79ee53a2466c0dae0bbe4b760afa97a51755f568cf10daeedc943d0cd7a303727a2e8566b2f7e382de4c47c6760fd4973d20be6f42e0bc35f4f46
-
Filesize
3KB
MD5918d475a2e854bceb6c3c43a3b758ea4
SHA14a608c254b62c31b8b6d62f645a2df4ea219a44f
SHA256e86d7d1de9ef60d47e0c20d137a90a83a5050abbd85cfb99412964ccc1b90b89
SHA512c53ad729542714dffd81fc69039f9e61a8208ad66b414f86e2f59bd60856ce45a6665e808acc09913162609e5df49c636305cd729f6e94544d24e4e079074d33
-
Filesize
6KB
MD596e39c983473cf2e7b81c611ffb0a44c
SHA17045ac86bc6b9df08ff721f44211b3483b746609
SHA256a7c77d6cb3fef44fa94116231390f9366c1e12bc9b4c0428d0f1bcdf3d9a9cfd
SHA512186f1aa69018a92f080374aea39529421099e43ddedbb14f7c042e0a9ae6776f63319afef6773ea89b8fd8781235f6a51e1b585dbf8d50191cfec673a6ec5d18
-
Filesize
6KB
MD5ae8f9e2fbb63c8a4f096b6e3e434fc3a
SHA16f043f403e1c89bfa8ae75861f4e76cdd36e8d9c
SHA25643b0487c8394b77788d25effa880ba6123212098aa2b6389e4b23f857c60a498
SHA5121c38d60749e18340a4e4ab430e4ebafc27997ba180b8e5fb72bc1b5af47381688958cdde0946cab1bff3542963e84ec0e2a20252264ff65725c27d251e9ca29b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d4cf49b97292ed9c0624d5768d2b93b3
SHA1bc9b986b949d857f488cdd783fc5ed9eaf3bbef4
SHA256049e7270041c3b6e3b3895ef694075bbe2e546438ec9c01bb0f7e4db865850e9
SHA5122e8e707419bb08dd36bdacad9eb93f9ec20b5e9bca420863ab40605eaf5b95fdbcb54f7f601742cdfadb7c8e51a6a873b26e8c96ee5d28505e35c341d249fa2a