Analysis
-
max time kernel
13s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 19:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1eDT3p_ZssNHL10UQfZSop9QEO7uY5ktr/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1eDT3p_ZssNHL10UQfZSop9QEO7uY5ktr/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 712 msedge.exe 712 msedge.exe 1432 msedge.exe 1432 msedge.exe 5080 identity_helper.exe 5080 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe 1432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1432 wrote to memory of 3692 1432 msedge.exe 87 PID 1432 wrote to memory of 3692 1432 msedge.exe 87 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 4660 1432 msedge.exe 88 PID 1432 wrote to memory of 712 1432 msedge.exe 89 PID 1432 wrote to memory of 712 1432 msedge.exe 89 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90 PID 1432 wrote to memory of 5032 1432 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1eDT3p_ZssNHL10UQfZSop9QEO7uY5ktr/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c1846f8,0x7ff80c184708,0x7ff80c1847182⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1468 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1533345529235214884,5397385050202463850,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD53e5b1d4a8275f498dbdee8b55303e74c
SHA172e0730188ba70cafd070609ca363a32ecdb63da
SHA256cfbdadeed6ff7d3cd919c38650215821585fd23a3b5ad8b627d5c7a70e2f0d59
SHA5126c22499cf47a0f9c68f96c70d3f5b96d5a4f1396b027f5b33a5aeddbcdf074c1d192d45cbf928122415fda4b752d8258c3126b58f9f4c19a7c0491df20f062d0
-
Filesize
3KB
MD508e164d3977bae5282dd7277359c5e3e
SHA17b7f845af9fb855b2d203a6ef5556aec7c0e1877
SHA256c25f98a28c6fd4fa664796ea7a08bc5d3175e429d60c35eeb7030384acb16bab
SHA512c9c6280cf63850c3abb4e862e740dbf0419a0e4b1e964d127518ac2ff1eb7058c6744f1b14b6e9aecdf42f129c790ccab924944b838ac4cdbc1d40622fcdc145
-
Filesize
5KB
MD5f602116bea42a40f219a2a106eb819e0
SHA1a45ae1b206d47361b995943d53331d422028fb9f
SHA2567d4356a9063d198bacbb2653bdb5ff5ce39f5e47ce86f306e7f54c5270b4d048
SHA512e54a821aeb5b43a19ec1e37297fe652c54bf566731205828a66745aaf78538cd1b5bb8013833caaaafcca6db298a7a510e42e986ddeba0f792cc5d4cb7d32fbd
-
Filesize
6KB
MD54ddf39f16eceb04ab72d9a4c36e89d97
SHA1393aa64841f56e575df5d20d1e607ef9fcdbf997
SHA256e1715492c1b2b774252acb26fc8aff7d1508c5627b995cb6a616326e4cde71d9
SHA512da640fd871c53357ffbbc23f08987a128d38b4dd89c76dd630bc96aa66ff6c0afa1c33d281ef02020b095f9f22eabcdcbcf13262fc807441beb047e7ef51240d
-
Filesize
7KB
MD55815aa6c40f04d07bc3f76773c06536e
SHA1906b780e88204e7428b5b8e6fd2331922899fa2d
SHA256b4c50f21343044d18efaf2599e068922c9f5255864ebb0f6485cf95963c107da
SHA512f41e3e02bd0cd298a6282ccd63f1b376efc3df437afd54b8780610f63791956bcd695b0803039117ef298674e204dfaf212b6fcf48620316c0ae6525a4f73b36
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD541298a9118c1c5f0678c6bd4fe86b05b
SHA110e4eb84db847ab4d373fef73fb1aecc99180ef6
SHA25648b3cc6f617e13b5851700b3237bc0ec84614bdef834e1699d400ef16b42f48d
SHA512a2c0ed5ab004c6c87f3b4363fc0be58d4e2787feec458f80ee0c3906144e6b1f81afa96b848f7511e0cd4721d8bd4930cd8befc0856593283fe220c34ec97bb9
-
Filesize
11KB
MD59f99c9191a71fa32c73794595bd0099d
SHA1e6ddb01b2edbe8066955b17bc6f17fd5032d903a
SHA2565d42174fef1b2816c424c739523af52239bcc8f72b82a510b5f938a0e41535e0
SHA5125fba992fd4619dc66eafd158360d8148841edcce9bb3715fb5ffcf68b284737bc04ce06185e859366bcb858b1ce179151594259ba4e09eedf39612866a0e8d5e