Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 20:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1Wj07ngMff9_V0N6-76x4czf7APGZn0Bw/view?usp=drive_link
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://drive.google.com/file/d/1Wj07ngMff9_V0N6-76x4czf7APGZn0Bw/view?usp=drive_link
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1Wj07ngMff9_V0N6-76x4czf7APGZn0Bw/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 2444 msedge.exe 2444 msedge.exe 4104 identity_helper.exe 4104 identity_helper.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 4676 2444 msedge.exe 82 PID 2444 wrote to memory of 4676 2444 msedge.exe 82 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4072 2444 msedge.exe 83 PID 2444 wrote to memory of 4692 2444 msedge.exe 84 PID 2444 wrote to memory of 4692 2444 msedge.exe 84 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85 PID 2444 wrote to memory of 2216 2444 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1Wj07ngMff9_V0N6-76x4czf7APGZn0Bw/view?usp=drive_link1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0d7746f8,0x7ffa0d774708,0x7ffa0d7747182⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,13280700257631584256,3143423420680416191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD56ba7078155c192c7a1585d5ce5677d4e
SHA158f8cae4e1268dccd36a99be297015ce073eb728
SHA2560e9da8038220ab0754ab8296db461c3777fa67570232048ea47d4a5004c85d51
SHA512866f12c272a6bc0eaf5ab7de1b129f83f551c928c393f775d52d0ddf32513823733543d31c43ee39d4d6781880fb23232de882ebb32e9a57d20a70edef66c55e
-
Filesize
1KB
MD5b4254d3d9e61271ad75eefbf14173ff8
SHA1d2299d1a12c730e3bfa250b962137b56289973b0
SHA256e13fb4bd11d3e4720ae009744897befda1cf614cde1748a563456a257b63772f
SHA5122c961efd7bbe6be85acde8ec5ebb0ebb90356f4497cc63074c0c79ba8b05816eeab817c469c28c3710df06e5ff0ff2a691d673eb346ba157d6c263e10604d554
-
Filesize
1KB
MD58d3da17c11eb0ea778bc49dd0dc43214
SHA1768d83948b1dde1b5d557be23a25b82e75bc14cf
SHA25633cefa392ab4e5c1ab6b4f0e0af2fcf44b23f41b2e8fdaee73c0f04e0ea5a3e6
SHA51214e6872252796a504695ad73a7a4876656cb89b17b93d6d4e2d3988400a86811f3440b367e15e3a4f5bcd919591e26a3b52b50918652341bc2f67217b54ac466
-
Filesize
6KB
MD56ed7f6eb70647397c2023699f0844c1d
SHA16da31aae513cb839985ff05d86f1f7c2d99955b9
SHA2562e5b4a80637f4ff29a4852be9cc70931dab1e8fcfbc7089f54216984a42e67ea
SHA512d8b8ca19c043738b9fe07d7700d15b48e42659dd84368395b933f548e98dc227d798bfa3370c5be08a2b64e56115a1a661825bf71fe5d73f6a8e5477c4626ee4
-
Filesize
203B
MD596a6ff01549bb8dc811170032cd73a28
SHA1234ba251cadd42c60295c2b71533cad84ceb76e1
SHA256f52a67b73dd59df0b8863b196f24bb214705fdc61b8afcaf02e0b1233a5e128e
SHA512d591d0d76fa60167569dfe325fb2d9a0586f6664dadf03e7c4ab93a026ef748a2321680034e3aff5518103c42f5c1bc7ef3105d4dacf96f88ac4bdcfe8fd98c1
-
Filesize
203B
MD5a22f5fed2799c4ed1e533ce71cd68fc8
SHA17d39bfd6267f3a09a18032f139e14a2096486881
SHA256c651f6a38e62ed2c778beb14f9e855f60e8f67708b19e298aaf91f9a4f9df901
SHA512e5f5c326f1a8d09360e4b94e34519bfaf1dfb673f887b890a918c848f23080eaeca5bc68a4e01f7a716b2c1c4d2da3064f51337e30b9d50839fe72c8afa07ec7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b9d5cdfc-49c0-44c5-a673-ecd3cd64ed99.tmp
Filesize6KB
MD53b44b372d4b72991f971775917728f58
SHA1d6ccf6eb8ed5653985e322cf6f02e9637ec4f24a
SHA256fe834023c83e8140815c4b690bbce1c342a2f3e7050d78cee36abfb8e91ad74f
SHA5121aa4c18374ed10c30703bf0aa5662908003095fc9d39e30461dc131578115b927c04c292eebca093bbf2e4022e08b63da87820a9aaccc7113a1f841e5dc230b5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a0225651840a776be83dce2973ae0ca4
SHA1c950cd2a55103fe91d7d67047b4ca210d98482b5
SHA256651101c451ddb297f77b44c05ca1b0d46898701c4074412d8ee071e1cee0d0e5
SHA5126fbd46692bd14a3432f23296639ce820c9c349422662438fa7cdbfe4efd844d0240c55d084327c683f7f16b317d0db7ebdd4ac4d43d67f9ca5c60da9f5df8235