Analysis
-
max time kernel
108s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 22:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1CUPVwbgjv08bOGq1be1q_Kk-UGopEA9x
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/folders/1CUPVwbgjv08bOGq1be1q_Kk-UGopEA9x
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 1892 msedge.exe 1892 msedge.exe 4064 identity_helper.exe 4064 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe 1892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1892 wrote to memory of 3252 1892 msedge.exe 83 PID 1892 wrote to memory of 3252 1892 msedge.exe 83 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 4748 1892 msedge.exe 84 PID 1892 wrote to memory of 2140 1892 msedge.exe 85 PID 1892 wrote to memory of 2140 1892 msedge.exe 85 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86 PID 1892 wrote to memory of 3004 1892 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/folders/1CUPVwbgjv08bOGq1be1q_Kk-UGopEA9x1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8dff46f8,0x7ffe8dff4708,0x7ffe8dff47182⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18405591339360640132,2180777395932294409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD59000e5e0d13d0df927a8f3125694fca0
SHA136ebcfbd539542df18289074db3f572cf408d690
SHA25689e906d8ed8eff3711a5dc727c8ad9acc952844e33e3ef82390f830cdfd2d727
SHA51262671611e6952cdcf0383e8ea220e2da2e1be2b9f0b2a1496a3b013050c4a11ee6df0ba8bfa02fda268a46b4e497ca4ead6d8e0641584c86d70e7c02f79a29fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD595379d1bbfe13387eada6e74543d5f63
SHA17fb22faa0711cb7e73b3596dfedc552b363cc573
SHA2563388587ead7640b476bebf82a36785a1713e0d5b64372bcc9d91a61ccb3d6c52
SHA512909ae772bcf1404ac8226d608ce412307138aad88e508cda32b513f9ea9bdeff10e6511a2abdae0a863ca861fb5b434885f76d942696df789c95b6d926fc9edb
-
Filesize
2KB
MD59ee81889863169c72a837663871c4841
SHA19aad9ec55f47c48c01eff925a86cb0cd6d3be96f
SHA256c1ce4cca1d2bd3239dac446127d7667d791bb08df0d8aa653e9866a552c62211
SHA512b86b2a70a2ba0c65de1301ab3f62826d8953757e989507fdbfe7ab7ad5c2db2d2db709a8e87f2569e0cb3c04b9a3bd35261642a0a8b0053c910efba90b150d29
-
Filesize
6KB
MD538494b2e2da640df08a5e7bc49027e48
SHA15a07912079bd198633febd315650f185708f4804
SHA256e0df9dbe322a4510dd31759169652215aac3be5c883efe38a7dc0938fa07ba1f
SHA512dc486edddb64a4f6519c5e98677f926897e06429dbbb49ac5e99b863c1c6b0c97131bdbb06482dfae307f06ab9cf1fd635f8d64a5d5d0b91bb415f7695cbc1b5
-
Filesize
6KB
MD56b792e57184177e1408f3a8e3bae18e0
SHA184ca73b4f01d1ec0826371ab8a2398112377c5c1
SHA2564bbb06608229d94ed8f99839feb919e48cb331dfe7ad505e60aae161a39644b5
SHA51263f26d9482f3eca835b4cfddacc307d3820599ac98e471b04675dee9c1758b2050fdeae485cddfbf08eeca0a286d7da28721a2fd6317ab5f0a6734e4b1b85a6e
-
Filesize
1KB
MD5e6d0cf253e7eaca62fac56f8a7c85b4b
SHA1bc953d86c727fa01a32c3a094bd7d2df140e2c9a
SHA256b62e6bfec4b2edcafbe0362564791d753dcdfa622ae3a46db9a10f931dd90dae
SHA5123131d36836b9aafde6f9a37d68d4cc8faf76b90b23a86ca5c6a7adb6507e29dae012b4afc31744cc46ae83b1f2b5a87e7fe2ad17d5405eab971828d79601a988
-
Filesize
1024B
MD51c612d716a5dc5489ce2a7ac04ad9de6
SHA17303ab9597027fc07296c1ca3bfb100ebabd1fb5
SHA2566bdfe96f69a699552b1d863d38a6d18de004bf218c4beb8098d7776502fbc026
SHA512b9f3d279f4d6926afadda78428be78bb969971e1829f8f8f144faa18416402ad0a2d987506a44aa5a2fa23f682dd5f799ddb2a809d62858053c4fc98e6d9c32e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55d8d7e55f7ba5502549233dfeb8de5eb
SHA1489be90245ed0e485e1051d652e67322662e7e00
SHA2565f3718c21ef8c0b4033ab6c0cca8c4593e366f2956c08a572a323e70eea74026
SHA5123322f10122888c29cfffb9c52c39918effbf2067fad4f773ad090397f2d0976d5b5d9a2db9ae12ba427f7b3cc3f40485cb9c9aab328bd562b9df57a495a718fb