Analysis
-
max time kernel
14s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 07:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1zhx2sDigW4t44fuINHEUqkqU0yKuRA2T/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1zhx2sDigW4t44fuINHEUqkqU0yKuRA2T/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 5 drive.google.com -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 440 msedge.exe 440 msedge.exe 868 identity_helper.exe 868 identity_helper.exe 3088 mspaint.exe 3088 mspaint.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe 440 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3088 mspaint.exe 4044 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 2184 440 msedge.exe 84 PID 440 wrote to memory of 2184 440 msedge.exe 84 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 4960 440 msedge.exe 85 PID 440 wrote to memory of 1584 440 msedge.exe 86 PID 440 wrote to memory of 1584 440 msedge.exe 86 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87 PID 440 wrote to memory of 4384 440 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1zhx2sDigW4t44fuINHEUqkqU0yKuRA2T/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff874146f8,0x7fff87414708,0x7fff874147182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,18356330641942490262,14231358791538972357,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,18356330641942490262,14231358791538972357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,18356330641942490262,14231358791538972357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,18356330641942490262,14231358791538972357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,18356330641942490262,14231358791538972357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,18356330641942490262,14231358791538972357,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,18356330641942490262,14231358791538972357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,18356330641942490262,14231358791538972357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3808
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4456
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\UnregisterOut.jfif" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:4280
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5f3f54f2d8e2d5106530a54d22bdfe9ca
SHA1d30a3bc6064dfacba46e116d13ecae5d7ae82a92
SHA256d2df99594a6da15ea2f66158b4661cd1fb5b19d561c3749cea78eb19e45df50d
SHA512ed9b2603a008c1ceba92dde94339f9983cb27efe92d0f5e8b43351de53f9104b2d560c77613facf69f627c11036f08b56b3f66c44c971bf23bfa30fd9c309521
-
Filesize
3KB
MD595803d4a8910563d917e283ac4e295e6
SHA11aa2d051d8ccc9c2fa664740d9ce2bf6fe621401
SHA2563de8f708aa292e54fb2581ddbeb09f9d23b6dda6b096d56c4b8b5231975d6991
SHA512ae13390ec4d630a28694868285ef1e902f17145d6035b9cfe8f376e6599320938e70d8b816e687d397d5524642f407361598596f1a518bf6478f80a6da4ae833
-
Filesize
6KB
MD5b000a2a01599db2234de2948c121e52f
SHA16e9de81280d7964eb6913122862be412e89ffc5f
SHA2567f10fb01784d3ad640b28af574c806f7d5cb4ec3e7c1a58f7b1c5279b197c9cb
SHA512abd33e8c6b3410195482daf05ddc02f427848c2911dde8e102e04c38a9ab37cd0ce4fe29d237fa3fcb3b90c890de0c7bfb2fab52fa232f8391feecaa06785ed8
-
Filesize
7KB
MD53056d384edecadf204347b0f435e4121
SHA1acd61301dfc5a308cb31a83cebba609f8aa70a80
SHA256ce406a8e9df8d100f78e3e244851ee77e2d2a4ec38cf181b9813509111856c1a
SHA512ca5842796bb68b00236d0978a7918ca6c48a9650c723a9d9b55a4a22eeecfc04573c563f00de8d0941e7a495ab253b92cdd2b42caf23e1adf149d5a104b1eee6
-
Filesize
6KB
MD5d8b32a5eda123b0efa5fdda794a2ed4f
SHA1f4ce0d00253a632f78d4ff036fb054fdabea1241
SHA2561895adcaa1f99d8738c4a8a5e90bc76e1fd6d1c2c45ce9f1770e0da899e74fde
SHA512c763c94dad7f955fd4bfa41a2c27a9ff42846508397e7db237770b0cff12dfef52c464a7163abb965ca2a7d096b13bcda4c3d7570cc81ae8144bffc07afb2fd1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5cc72f0e910d61f22c76a6f062f1fa346
SHA19a59ccfb1fa2e86bbb5931aece8f27850e48cacd
SHA2568474beae41ab0c8ecd95bf394aa57852479cc20728bd5ca049e7895bbb2b83d5
SHA512ee1099e357cdb138a5f9b8ca4d96b55aa9b2d32ef3eca45298ea40936d69c5379f5d5c69681a7ff3b69efabe142b92e9977b50bcb03cbe5680af8697137b8f98
-
Filesize
11KB
MD5e887df78695d80b2f2664e670855cb32
SHA181c0fdc7c5339f1f7508b05416641a066792b762
SHA25638832e235ea7e5d04d4a9bebdbae0b3a344aad6c08127d2d2bd95b7901cab8bc
SHA512b09ced3c814f74f40054a8b590c40ea484d4b27d8a8360796415b5ba27f3e3c79b3b6ae27cb8ee0d5fae4570425c8e4c07c45fd0fcf7365bb8e7a6a829eaad7c