Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 16:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1sy8qAoF7bB4J1ONGQo2eTYIlVLCGUG0Y
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/uc?export=download&id=1sy8qAoF7bB4J1ONGQo2eTYIlVLCGUG0Y
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 4580 msedge.exe 4580 msedge.exe 4940 identity_helper.exe 4940 identity_helper.exe 5872 msedge.exe 5872 msedge.exe 5872 msedge.exe 5872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 2288 4580 msedge.exe 85 PID 4580 wrote to memory of 2288 4580 msedge.exe 85 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 4536 4580 msedge.exe 86 PID 4580 wrote to memory of 2860 4580 msedge.exe 87 PID 4580 wrote to memory of 2860 4580 msedge.exe 87 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88 PID 4580 wrote to memory of 1972 4580 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/uc?export=download&id=1sy8qAoF7bB4J1ONGQo2eTYIlVLCGUG0Y1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfad146f8,0x7ffdfad14708,0x7ffdfad147182⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3532 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5905944378963834215,11359580758861249433,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
826B
MD59aea1560d69d11fcaf7d3580089023c7
SHA13b80b068dc7b8e7ba3689272500c6bb65308d3cc
SHA2568d333553f662928668e115406340ada97e3c16ad0ffee25398e54bb6f3bdca1a
SHA512630a04fa6f1c4537622269a006ad85f7e19b75a40abc5b2eb439c0d32794e22e765a807a3f8d55c42f899ba56035e38f7bf148c256bc122fdd87a260526fabb6
-
Filesize
5KB
MD56d0fa6c07d11c24a33eb5a440307c4bd
SHA1c404e18dafa131299f07702ad731ca9c978aca76
SHA25669301428de16dfcef9f76ce393cdb91b076cc25c51bcf795ff731bd88cfa0bc5
SHA51288263a7d6f0cbab66d654a425ee952648012ce3b4b13fa8a8a460a9153e28f4506e234da96b8730d166443774a015b821f082be8d602dc671cb6a1cdf3080470
-
Filesize
6KB
MD5d6d5e7da6dc274c0d344351537fcc360
SHA1109aaa8f10b7eb693f2c7e3d7ae60c8bb2487ed8
SHA2561c9d590f301889fea15ae048bc113f4cbd9048d59306e776bb4b65c4a5de25a0
SHA5123ef9534e2cb2051943a1b69dba923e76745eac5adda6766669c556cd85eae225e81d0f79bb1083c108c9f676daa2194e08323e991f4da73fbf09570a2073b0a4
-
Filesize
6KB
MD509e8adef3d5623b92f914724c09aa732
SHA1c36209800db97d457a611e7cb86f55773d8b54d9
SHA256d37f0bf444f829cef3bff59542f06c65ee35f4817b6a7bf5073765f6b7953a6b
SHA5128ae86c3579898ddf672de4d95850d330841eea52a81547659cda08843636a8ff193bcd792dffd50254e9c8fd9dafa58311bc98cf17f996ec3b3dd6c39d10346a
-
Filesize
6KB
MD5c72d24e6e8589452d058521f2393c4bc
SHA10f09e67d2653b18e31da5106b6d59a44d4a12ad5
SHA256f7939f8cc1a469680510c486430c8efd23811e3087b8d9bbeb0a7d897798ef7f
SHA5123b9e06f125e3511bbdb1e05b5b3408a5315dc36c48299ff4c2fd3952e307656168e31b7c124d8a95ddbc78adc13fc6beeb8e65a62cdd0b057d3d34dcd85ce8b0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cc984cf9ea51640b752992f9134d850f
SHA1d15ce77f0a3310a82415d2e519c5c68ef2587558
SHA2567bb2aea839e164a339c5d39e6b65ddd3606200192a1eb147fa93f9f84eea2ecc
SHA512ccfacc2a07ba6f08ecba2521063b17de7fde654a8adc107e77283132ea1c5b688cba4e4fe75452ff26ec849b3dfb4e8f55eafb900d9d4814727dfa896fd5cbfc