Analysis
-
max time kernel
37s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 23:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1CUPVwbgjv08bOGq1be1q_Kk-UGopEA9x
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/folders/1CUPVwbgjv08bOGq1be1q_Kk-UGopEA9x
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 2536 msedge.exe 2536 msedge.exe 3652 identity_helper.exe 3652 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1112 wrote to memory of 4692 1112 msedge.exe 84 PID 1112 wrote to memory of 4692 1112 msedge.exe 84 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2948 1112 msedge.exe 85 PID 1112 wrote to memory of 2536 1112 msedge.exe 86 PID 1112 wrote to memory of 2536 1112 msedge.exe 86 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87 PID 1112 wrote to memory of 648 1112 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/folders/1CUPVwbgjv08bOGq1be1q_Kk-UGopEA9x1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8649346f8,0x7ff864934708,0x7ff8649347182⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2212 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4606932069010909250,15932515552342815773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1712 /prefetch:12⤵PID:1400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
6KB
MD5e725da884f36e20d6458269716738372
SHA19dc3b2c75ea1b244a3464390010bad0bf2471f30
SHA256a65ffc281abf7fcaa6096c21c5812e9175b4090c79cb8f32e4ccc9968d51fdb8
SHA512712d084dfd643efddeecc6be3d1269340107efb4a461bd13df0b124316ba0077947f14ca3defc4a9f88ce59250fc50db1ab6ab44489ad6469297ca9faa47f0e5
-
Filesize
6KB
MD52e2e038d5c20fa38cbd79e61bf937219
SHA1227d474b40ac2e79194d01afd2685106374d5a01
SHA256b9add5554d43dbe4b935d5108e4f5c1c7dd6d873fc736ba5659488a901b00711
SHA5122d80fc1701ea5a0de687eb0ff00cdfac5727ca69eff5ac9e12669b8c946f55e1dfdf399a25bedd92d672e44ef4d5d7157efd4bc74220fd2959991ba6f8c08fee
-
Filesize
1KB
MD5c93b14d30d23139e3b645d335c74d9c8
SHA1600bcefa28670a6a6fcb2071fe37740f2b220bc0
SHA25621a87ef6631fa48a5a7618d13a321dc5f9ecd384b40429d915d72fb0d03cc7f1
SHA5126c57a73fd62da140ebe05e40eaa4964cf5348015c26fe92aa43f6c8f58196827eb4a7572d7b3bdbb2e6111d9b43bf834d133ab901aefe551e287206a8b6976b1
-
Filesize
1KB
MD5cd4bb5839846cbce7fa2706cd97c9406
SHA149660f259f78a79f2f6acf1ee1fd83efc24e365b
SHA25686e69196229116668dd4afd6c935acefeae4540e82680786ee88f09e6a7615cd
SHA5120c21c01a1420523b5c7f3ed3267d3dbb0f42749706379bf052febb1e15f70387b989c8e42d72fb89ce8b8d83601a7edf65a9513ca9e2516b778c1e7aa9c7da69
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6a85107f72f7ff41c162cf50259d968
SHA1089d51191e532060e7b5eeb0fdadecd6212e2529
SHA256da18223b855cbd000052fb99523b4ea8734e8affd5314cfeb22d21e2498ae3e6
SHA5123d060b64e15beddb0fe1a9999f980806f3311bc632793d573a74a1624fb374e76a44ae5c2e7f3d36bc310380e2065ea2effe21c02fb6be4bb8fb696dfe0fa233