Analysis
-
max time kernel
28s -
max time network
29s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-08-2024 13:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1d53w4_YqtysZdoJNofzl325J9_j1mF3U/view
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/1d53w4_YqtysZdoJNofzl325J9_j1mF3U/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 drive.google.com 10 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 2388 msedge.exe 2388 msedge.exe 4336 identity_helper.exe 4336 identity_helper.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 992 2388 msedge.exe 78 PID 2388 wrote to memory of 992 2388 msedge.exe 78 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 2332 2388 msedge.exe 79 PID 2388 wrote to memory of 3968 2388 msedge.exe 80 PID 2388 wrote to memory of 3968 2388 msedge.exe 80 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81 PID 2388 wrote to memory of 4468 2388 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1d53w4_YqtysZdoJNofzl325J9_j1mF3U/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9d7d13cb8,0x7ff9d7d13cc8,0x7ff9d7d13cd82⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,1641967513787020051,2403926121335116345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e2612636cf368bc811fdc8db09e037d
SHA1d69e34379f97e35083f4c4ea1249e6f1a5f51d56
SHA2562eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9
SHA512b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d
-
Filesize
152B
MD5e8115549491cca16e7bfdfec9db7f89a
SHA1d1eb5c8263cbe146cd88953bb9886c3aeb262742
SHA256dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e
SHA512851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5892cecb3adbcd30a1284b418cc0a6a85
SHA10d654390e8b69e946f68dcf851f4a684128073d5
SHA256eb9a2c0a6a35ec4ad247cfbb594e95e325852e321d0bc88c0e91731f0b581579
SHA51235a409c5328f1ade9125d83a49f4827d20d59552589e90b2ea03541059804e696082a493e152c2135005d0b5f2a6b4f6918b2ec40c558734bb9315747248b1e6
-
Filesize
3KB
MD5885fdf5a317395321d2722f0e1f9b2dd
SHA199eff86ceab6275e9065d9d5af74a597d933ff75
SHA256264d8389268d5a5df45dee51333e4e69e3a8fe6e3a5d591b6b336e87d610b23c
SHA512482eda86b6c7c0b015f5ce05b45896f51d5edfd2290c32eb6f59c597214da76101706173d4e04e8c9bf4a39a3a58db3ed92fadba6eca988ba1147b864250a06b
-
Filesize
5KB
MD545861f154530ce37e01e48612500d8d0
SHA18d932781bd608d388577ff89b9b51e462bb079a3
SHA256abf2f11da8a40625341e3d3ce8dafbe8564599ffeae79322f2024a20a6e4914b
SHA512090bcf3508e8d48e30775b3657f3a3b8c6fc657ffc0a5f18a4ea67e2d176a7800568c23e3480d5ea4ee7f62734497f62d49d14c349cd36b942a41b1c75e38b1c
-
Filesize
6KB
MD5849f99cbcd7c51591ed7509550a802eb
SHA1319a42e01d3843a7f6b946b8bd0791dd57292ebf
SHA256ecb745461d0e914a3a221b830bfd5b8b6858a2b752a29e79d55309013a590a72
SHA51209ede7467c0ebe5c602f35ad616e601fd331bcc2cc87cd2622fb37769a61480f027e9dde9d3accf3c599a7ffa5749f76e936e2989ba126897a6288d95ae8b14f
-
Filesize
6KB
MD5e4b62c40dd538295a0b12e826a029985
SHA1729a6fdeb33d6300a3bd641b3a3c89b2e567c591
SHA2569e20ed681dcdffb4a88534f8673c18037f5d2d0e757ab74a6dd2d605677cad87
SHA51268619fa68102d0c331cea8936fc46fe95721cbacbe81788a77f6f63ff154d4084efdb07c56be6a3078158a74617d49648aa6b825d24441386c6cdef132cc7a7c
-
Filesize
7KB
MD59a0da8b77a74ba3a8e2666791fa13f73
SHA14ef92352b640d90059582350b13850685ceeb08c
SHA2563311cd9b9fe72688c4dedaf0a4e2f0c741e254b7b2b78b5075c988378e5b92c1
SHA512cc12b0e4c5ce3ad32beffb41e8458b2b001a7323c6916b89938d989a50b631eb8e9d89a8aef511f4bd5e7a1e6afb46157d84121920cb752ba5331ecbb7fdfeda
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a23573e81874537526c8255221b1f159
SHA11c815994b18a0165d3d0a90a96965a6e17720941
SHA256bbfe433e79ede9128c0feb73d0a7a780184c23ac836cbe4706bf516dfd29bc61
SHA512cd3fc4ef9e17e1ad356b9a508808105f57c6afbc2b40b7dd8da7ced21d5ca2dc983121423e154ec972abdca117bc615e2b17b69bfece242d595402aba27ece4b
-
Filesize
11KB
MD5e288a7c7656e89be04ff1b05a39cb92d
SHA1f97289753aa557e0b310ef38dab4071d35c7edf4
SHA2560b868096f996ace2e4e69fdd6ecb7028c68ab1c7ed2187f39d36519d8d355e66
SHA51259cb21a8c66913d26e8904b74d7b321425b4d8cee0909fa855da75ee7b725afba9281e749fb3777db898519c065bea1fe5401a66e43dde94cfa92ef10326a8a5