Analysis
-
max time kernel
524s -
max time network
525s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 18:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1FVZP-1_rDq-BUHqkIve20KtqNg_7g25k/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1FVZP-1_rDq-BUHqkIve20KtqNg_7g25k/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4172 msedge.exe 4172 msedge.exe 4388 identity_helper.exe 4388 identity_helper.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4116 4172 msedge.exe 83 PID 4172 wrote to memory of 4116 4172 msedge.exe 83 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4560 4172 msedge.exe 84 PID 4172 wrote to memory of 4812 4172 msedge.exe 85 PID 4172 wrote to memory of 4812 4172 msedge.exe 85 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86 PID 4172 wrote to memory of 2980 4172 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1FVZP-1_rDq-BUHqkIve20KtqNg_7g25k/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc603146f8,0x7ffc60314708,0x7ffc603147182⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,366095412502416695,4697884247495789907,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5cc4e8ff5f801da16c6f64010bded0a14
SHA19503e6f0b4eae3c62ddfc6503d2ed21a8da53057
SHA2560c05753a5c879d1ed2433e7f97e82f1a4bfa3d8380b223f3687b740fdbaa7f0f
SHA51219fe0ecc0e974fa86a4da8a4e352206e4c51b0bc6f728203cf1b980079142da06a8f6ca1d4f81cc154868468f5c14af4caa3d43f07e8f15cca10b8e1680febf3
-
Filesize
3KB
MD5663e1c9bcfadc35e561fb2a7759e48fa
SHA12fbe6f6e4dd22d4cec40ae452dd151876a734185
SHA2566ca93939d0333073ca066b6b7920d00c71ef1db8689322b3d0a89ee2198190fa
SHA51224a78dde0cc945ceeda57eb559103c88b925afef9be69db388eb4332470e902dfd78adf5f7fb8762ecdaff62e207a070b3a260a2fe8a2b0829af3e282e1b9e43
-
Filesize
3KB
MD56f444498be9e1f86944ca0ca4b331124
SHA1d6918518143562577ca8b62f2efd44948d814f60
SHA256ce75e460a7b838b4adc5a8c13bf9b9fa56312a7be782d811fe235dee09f89076
SHA512b36c0bf0cd5fb0493e47ebc1e6ae8e06289f9396497ae21091cc3a75a115655914a72a44b0b56b0d05618c1249d60fb9f29115ed8b853510480678afc207094a
-
Filesize
3KB
MD5346cae09760c898ca09c99005ff8141f
SHA187cba1fea09b54c0a13b4ba67433e1a79212ac0b
SHA2569674a1b52ce7118024def599e0a3f061f2fd90bb2c2fc1804457ca78463114d1
SHA512d578945ffa78d8f57d611585548b5786dc3de544f18442eb5911c60dc20f5f76ed7fdbe0495b8554ebeef00fa468cad0615d2e7486b0cb9b9b0a26643da5cce5
-
Filesize
3KB
MD59b823103d98c51aad3664d19b9ebe1f3
SHA1d3ebe808d2d989ae0759206415bc73e61bce9a9c
SHA25608a5a8d0aaed8ea747e3fcf9770f946f752d0f03092b27af5b1011920c83b7f8
SHA512d2930b1e7784119b47b81bf24386828f0c735186218151e6fa3a6b2a9339d45199d3f67db472b2b5aed0282a997203706cb9d88ccc90f6cc833e49905535460b
-
Filesize
3KB
MD5920cd7f460da62873ed02ddea089cd15
SHA11eba3b771663df2a24aa8b91b60f32dd4ce4a7f5
SHA256038743935da785e3636783e302c8efab8f0f851fb11e2a1a6e3f68d0d8e130bf
SHA512cf1384b4e5a08857c48678e4c825df0bca08d42b948033ad4c4d267587b4a1789b95c7215e4f6ac5e414a5fc01843df1a5e6763d7f841098de5c5a3bc37efb2f
-
Filesize
3KB
MD5674d6828b4e34274180424340231d56a
SHA1ab6730740dac63f852ca49cd6367d346efc002f6
SHA256ddac8adc0151d3ff92804d41c853a6e5cff4ca529ef2a668aa03339716f425d6
SHA5127ed9b05d402a66770c9921d2e30b3a27ba5513db7dd93db143315890bc6b3135ef20dc32eae76a28ee83a38a9cac509bcf90bd0025c7c2dd94ed0bdc170ddafa
-
Filesize
6KB
MD5efc95485ceecef20dcb1ce727524852a
SHA12eaaff529c447bad98b2f711d31358e23b4151f3
SHA2562cf51e84157c46e62865f383a42b2115654df4a498c9f84822c08a95bed38752
SHA5122dc68a328fa5be01fdc71d6e61fcaec372b7d932388fc2ed480778050e73be63cf03aee45cc02b526aecc07b775babcd0210de20084961cb0f6470b39ad7b086
-
Filesize
6KB
MD5fcfdbb67047f56f80db7475e64fa83cd
SHA11b061d4a5d9d52d544fbc72cf20ac1db56203685
SHA2561c2f12ce30e56867af6e242a2254bd51e2cbf6ba41fe565d2b69bffd8f50ad06
SHA512a4d0634d6f3d991155b15af32d9d590820f50b221d1aeb7a8613da975d27acd781e039017e9d55f7ca2c332d0d3afb3d41e9a56a34f2b1abe8b04c835c51950f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d907201ed91962490b1df470c98850ed
SHA1a96b1b7e8836764a24e199a03a65ff9065c4e744
SHA25647f425720ca8de20f698e28213eb7b8c1ff8a2c698e2e1470e8b508164105de6
SHA512d06ed7881bcaa29773f637a5135349d768762c688123f4b315637637d3cfa941d2ac618cc2395bf418fb19c33093e3036a06f599e56a5572151b3422885f5505