Analysis
-
max time kernel
279s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 19:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/18cohF70qKzu0HkKkAFd3Ga492bkGQ9u9/view?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/18cohF70qKzu0HkKkAFd3Ga492bkGQ9u9/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3284 msedge.exe 3284 msedge.exe 2420 identity_helper.exe 2420 identity_helper.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe 3012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2200 3012 msedge.exe 84 PID 3012 wrote to memory of 2200 3012 msedge.exe 84 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 2516 3012 msedge.exe 85 PID 3012 wrote to memory of 3284 3012 msedge.exe 86 PID 3012 wrote to memory of 3284 3012 msedge.exe 86 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87 PID 3012 wrote to memory of 3568 3012 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/18cohF70qKzu0HkKkAFd3Ga492bkGQ9u9/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffacb846f8,0x7fffacb84708,0x7fffacb847182⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2732 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17828259557426159398,8115615032609591594,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5ba9cf7fbd51ced9e69bdf95d2437f15a
SHA10e3d4d2396d3dd4ea21ddfcf3b6d56e129614099
SHA2562b087802d0fd355df3dc438eb193a656b6ba4a34155cda85fa2647305f1078ef
SHA512ff33b46c18d1ca3feca000daaaa6de6d161401bd122b00a6f60d014d2fe5bcfce28eae335b333a80e28d5c7555d39eb2a2e9aad16e0ce4f8b68c864f18c292bf
-
Filesize
1KB
MD5b955354341fa033e40b7e9750f7907de
SHA18c3bbccc3897dc380db5378f461f8fbe091dc442
SHA256000df8555f9ea3a423225551907e380fafc4fcef213005e2a2ac9b82b49f42e7
SHA512b797f52c715c116fe63536ce7eb67f4fc010ef1adb3e4ab44625b07da7e96dfcc0770b23d0919aec7347cfd534db3bf525ccc05a9db2c4b00499b69116e3a9f9
-
Filesize
2KB
MD5a4bc0ffe31b688e3a2b0cd8183bca214
SHA14e24a9bae69a8e82ba905495ede974699c32f038
SHA25695ad6f1daf9f9dbc1fd676ea166d4ba3112f3eba4726c806565074522a647096
SHA512e20b29a1b87e9b5209e83edce35a6c4ce3905292e926870967172cd2a56a3014ca0271e9221e9a1bf04848358bf55202ce4441235c55c10fed542e72023a8883
-
Filesize
5KB
MD5b805132b848840b620f4fbe3bd4cce0c
SHA1608eb34fb4bfe5cf6b5636bfeb1fa592e98a4bfb
SHA256213b2a9bf06e6ad3e393661ba9d2c77cf8ab59397cb3fc250306eb6add2f5e1c
SHA512fb5ab540dceab8be25daeef97efc2b4c0ecc2c7512696da3f4c0b9246f122a867446b97033047011b04c87bda54026409d69e5d50905d3c1b2053f85c7e3035a
-
Filesize
6KB
MD582b67502fdcfe72756a2fc1d8344ef36
SHA1761960c096a8c19f58c1326c915648a9ec330d42
SHA2560ad5c5242eb339bb5e1b96b8edb67ebb9661483a270d8893938ec46c643b083f
SHA512ff4b0f4a68e3337dec58dc75f873bca1e01b4906bdb3bad1415e5d6433c50ef7cf773a89fd05c47811236ef363e4b4f5c4a717017d7a486e0b03c089440cb999
-
Filesize
7KB
MD55d6ade2dd7b28dc2c5977718d21173e1
SHA197f1fb8c7f906a085d96d85681f6f21c3e4ff9a1
SHA2568b7e4796a3aa2dc8e9debe970be381f6e701933cdaa81a011985d80f13123780
SHA512bf2d5e3e2cc529517dd9ba6539f5fa0694d5f9054d6cd9bd488b21d25a8caa6f18480781eaa54350868a41b29cb126a627de41bd6e0e0ac2bd7e77f60c609ba0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52c7704d871ae7a6c51e8f7c8f78e975f
SHA1de910ab609429f156020961681b0a7df62a9a646
SHA256a17787c934f88aada1bc851a34691a20798ae96ce4a40c45dfa656bfe59e7744
SHA512ea287bad4de70b0e68df2c35e9b62806fd93b3d4f9b6b8ee328a6c437770addd12187f512b48f3a0562f00d5394a5dc636c48269f6a67f2d77fba9bd68d200e4