Resubmissions
21-08-2024 15:43
240821-s6b3vszgrl 1021-08-2024 15:40
240821-s36s3azfpp 1021-08-2024 15:31
240821-sx7heazdlm 10Analysis
-
max time kernel
300s -
max time network
303s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-08-2024 15:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 4 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2288 msedge.exe 2288 msedge.exe 2664 msedge.exe 2664 msedge.exe 2668 msedge.exe 2668 msedge.exe 3056 identity_helper.exe 3056 identity_helper.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 456 2664 msedge.exe 81 PID 2664 wrote to memory of 456 2664 msedge.exe 81 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2700 2664 msedge.exe 82 PID 2664 wrote to memory of 2288 2664 msedge.exe 83 PID 2664 wrote to memory of 2288 2664 msedge.exe 83 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84 PID 2664 wrote to memory of 2788 2664 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/17HK-EZtmp9Jo3L4tgadFEfmAP_LNQyR5/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffbb073cb8,0x7fffbb073cc8,0x7fffbb073cd82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1960 /prefetch:22⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,11812903460326342028,10305671646608973037,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59af507866fb23dace6259791c377531f
SHA15a5914fc48341ac112bfcd71b946fc0b2619f933
SHA2565fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f
SHA512c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7
-
Filesize
152B
MD5b0177afa818e013394b36a04cb111278
SHA1dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5
SHA256ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d
SHA512d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD59b7cf5ce7f68a62d1ac199c9c31560c2
SHA1246767524dd16afe29ad202a3be66b7cafd1f311
SHA256e35ecd2b0f0e69ba74e89c8ee5e190faa2e633df4056c68a2f0e4b50a72cce15
SHA51227c10c8f4c00cc5ba46356adff13fac359002f940feccb29765c42ad4feb3adbfb7fe250065d179d794a7d34f95e24026c86fb627bc1388e9bd92ec67ce2b207
-
Filesize
3KB
MD560bcdb909d7c9c98dbb380a29a6e284b
SHA105def8f85fef10971e5dbaf0b740a223ea15ee02
SHA256c09a275f01d2f94dabf7a598225eaa6f77725889e32c42f5b698ae17648bfebb
SHA5123bbbd730c32e54fd062101bd3273e2b61c6170f25b76daa0c2cb2f288808933b6154a5dfb57860d441794e7db5b2144d6e60c5f7e405aacb8687480717b8aee0
-
Filesize
3KB
MD5bdb7f7ffc2b35a9d3a76814dc5272b4f
SHA1de0f3e782cb225755394d5b9ec4b832968b84946
SHA256017fd56e11beaf71d7acb299d8755a1faa09afbd3e394b0b3311cd498fb7fc03
SHA512e7cc8826378990ab0245aca72cb11730fd4db42c5ad755005b0d86872d5ddf95c7c6ead12842e9e578898cd637c978f0fce8b0821f524327034f5b7f12a6d3b3
-
Filesize
3KB
MD52ed0e3f093e61a668b5dedc9cd729539
SHA1a38ca42782d5faca34b64a9852fef93f3449c5df
SHA256f6ca9e16cec6812e3f7ed62f2f7d736b3b2eb12dc61fdbd23aa260565dbbd972
SHA512facab8f1d82568b1d2431faabcda6b87f66d9dde45b305644007a841a0804d74e1481f4909c3cac32d14aa2e0e74a6b41be1c6e37375a3ddb24f9ed1dfe59128
-
Filesize
3KB
MD5907f78dab62f805e0c752fd41b86f846
SHA1d82a9882ebb7a77a8a7b964539ac0aa5487d20f2
SHA256f89fc39556c68012b0d181c84066b4f5211c7c231c31a8b4d1aa019bda9e5b39
SHA512613fb55f1a4d27c294895d08827941a46bbd1839b10f159371b37cd6cf3cb231c2b6409f34d2da6838d8e7531280c278421adbb48c815dce338f28a7bcb3a562
-
Filesize
5KB
MD57e48921d88072f791eddaef9a826fd90
SHA1b526d16e41f966e92290b81ef24c2a1a4afb477d
SHA25638519629461ba2482469a3cad5b9eb9e73b9bfc91993398e481568bd292347b7
SHA5126aa90598e6a68a7cb532e624d768586d040c95e5ee16df1de324188bc4f3153e90e728df7c6a120f0865ea09a2fa93b5fd7252294b148fbc92f99942c926ca6d
-
Filesize
6KB
MD534f2c75e5754fd9a9a72b7f6cbc86727
SHA1f28e3bd697d2f95a61c0bea107256649ce77c690
SHA256f790d48957559d36b1c7d9f6ede8270ae025c39fe7939ea93c81897779f4ec0b
SHA5128ad0a8f3bbbdfa365e4d1e60c066a565700e30cf28d3c2aba10f20c7fe25ce8f46452efc86c9c7b6e3a8d5287a795176d7cd916f2193189c034b39b6987356c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59dd271adf621edb58c5fd9111d34c7c5
SHA1517b8bd33f9190a543dbe1bc5dbb411ba87d855c
SHA256c3af5ca609ad3e4beb18a5b2a42d80d5f656eda0f892cb62983eab4e902b21bf
SHA51210855ea28e9375e4872f7b88d3dab161a008f8adab3ee2681f3c28498bdb50ff3426c3b999e80e85a68e684e16f7f09371689660528dfbf6ebcf8d1fd0b34088