Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 20:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/10wTEiH2CA-sdJ6vh5sm5ZvF0Tux2YMZm/view?usp=drive_web
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/10wTEiH2CA-sdJ6vh5sm5ZvF0Tux2YMZm/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 21 drive.google.com 3 drive.google.com 20 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 1072 msedge.exe 1072 msedge.exe 4484 identity_helper.exe 4484 identity_helper.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2404 1072 msedge.exe 84 PID 1072 wrote to memory of 2404 1072 msedge.exe 84 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 4404 1072 msedge.exe 85 PID 1072 wrote to memory of 3992 1072 msedge.exe 86 PID 1072 wrote to memory of 3992 1072 msedge.exe 86 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87 PID 1072 wrote to memory of 912 1072 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/10wTEiH2CA-sdJ6vh5sm5ZvF0Tux2YMZm/view?usp=drive_web1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8f2946f8,0x7ffd8f294708,0x7ffd8f2947182⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,167590925082078941,12185432965078417942,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5077366223e793917be671a8af0976a5a
SHA1043fb1eea74546325733eaa37feb43f04beb6b2a
SHA256e5f98b52760bad5d36cd3d2edafc86ae1925bc3ceea3a046edbb69efd2995152
SHA512b6e46e87473a2518f14d3720e39951cffcfae55265f868c5eb1716704f72e36d5aad94db3f944a2ed6621250ecad04880a764e9edfde218a64b183f4d6669e68
-
Filesize
3KB
MD5799f8102779a6031f8cb77ea4fb3cbd8
SHA12eb00bc96f877d851e14defadb3d526b4c2eb8fb
SHA2566e8055dda32bf1e288816905dbf21fdad216a3baf627248e1e7f015c3d36a576
SHA5127dc215d635e49cc04aa9caef3806c4fdf44d136cc701267c8e9e90b971f2fa3a7e15a2e9796394833aec1a0cbee8696b6f9096c6d98f80e9d9c82f7841289367
-
Filesize
3KB
MD5b276bd5a844efa053231aa3892f3b800
SHA1cce058e631d87698c6a69c4755278b1d3e617fb8
SHA256814d4e4c12a0e78a0baa224d3064e390b278d4c6706d37e9e7b47d48b30adc8b
SHA5125c4db4abe91b8fee2fc0329d16122b485b78aac30df509062fc4b8c1b3b6ac1ba4e122450a13bd1161eb2c3e5968e4db311d78abd3ff9263442d707791eeb359
-
Filesize
6KB
MD5323cccd8e732168ca77a1a63eb1a3a5f
SHA1bcc9f2e9eec7627ad108f3508133494d5dd6279e
SHA25693e893959ae713df199accd49f334660c938414041db5c42429b38618bebd446
SHA512847aa22a33b5f3b08cdc7e24ca51d737d06a548e67292dec3b32ab7907e998d770e90cac1f53366ead218bce7236858a449a3757b8f1d92c7199e3b1a5dd672f
-
Filesize
6KB
MD5b796c9d0ebe3d54b0ac4af15cc6bc7ab
SHA1b23ac8e251d5ac5147aa98828963a7343d87d653
SHA256f9cb4d262a7add66b819bdc74fb0ef7bc4b1e70585290e63c3336eaa5655a24d
SHA51240113cf4ffe240dc158661d2c4148b8f99dc35cbdc6a3047ec4761573bb519fd62f15d9b54bbb4184e2bf059506e0fa58dfbfe046e18ea2ee5b459e9661baf42
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD522333b6bda78a618408cd574b6a74765
SHA19a9d17f88766de09b580154b7a32750dd92517dc
SHA25608acd5db34780a27cec4af4b81fdd3cc00947086e2b3f220a6856587f36a21af
SHA512657eeee1be8169f87cddde8498712ea8396f569f69002ef91e383fe8fb22f89f8bec3829f5ac5cdaab6adacfbbbbc06d41c2271a8638ebdf5e62841d56d69b18