Analysis

  • max time kernel
    55s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2024 06:06

General

  • Target

    https://drive.google.com/file/d/1Rv-z3G61GjXUUV8wBsxQG9wwPIL52-X-/view

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 11 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1Rv-z3G61GjXUUV8wBsxQG9wwPIL52-X-/view
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa527746f8,0x7ffa52774708,0x7ffa52774718
      2⤵
        PID:5048
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:2
        2⤵
          PID:1988
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:384
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:8
          2⤵
            PID:2132
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
            2⤵
              PID:232
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
              2⤵
                PID:3116
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:1
                2⤵
                  PID:4564
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4592 /prefetch:8
                  2⤵
                    PID:944
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:1
                    2⤵
                      PID:1216
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:1
                      2⤵
                        PID:3956
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1
                        2⤵
                          PID:3988
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6516 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:912
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:8
                          2⤵
                            PID:2912
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4092
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:1
                            2⤵
                              PID:1544
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8028526051154874480,14022247583922449723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1
                              2⤵
                                PID:1828
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4488
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4504
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:5400
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:4020
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap18225:102:7zEvent17755
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:4608
                                  • C:\Windows\system32\mspaint.exe
                                    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\Key-AvastBreachGuard\2024-05-03 10 31 37-47621.png" /ForceBootstrapPaint3D
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5512
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
                                    1⤵
                                    • Drops file in System32 directory
                                    PID:3880
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5664
                                  • C:\Windows\system32\NOTEPAD.EXE
                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Key-AvastBreachGuard\Avast BreachGuard -6-5-25.txt
                                    1⤵
                                      PID:5744

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      96142ba45f7203a8c4d877b2d70588b6

                                      SHA1

                                      e1d1ac761b3c41ba0a3409d7bec68ca22ae1fac7

                                      SHA256

                                      dac3fb834fb077720a5a79f49add75e37c15bd07ac063b5516061ffc611c334b

                                      SHA512

                                      fe09d408370c5ddfa3264f870118fd2edb2e4184871a8029bb62a438be6da78a8e1f72d176149ce6a4963e9981136dc878aedb1e0c660833482a9850680a4beb

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      b367ffa3cd6896506992c5bb8b91addf

                                      SHA1

                                      93c9bded12fd3a814e4a87d1ab6b102818a9996e

                                      SHA256

                                      a2e0b202caf41d3a5fbde3824043e423cc9ce0ec9653a9d1a2d23b04c1467b96

                                      SHA512

                                      44e2745fad967ce9b7a2be00b75d6617d441ebe2763d81a8c038d57906b1c94d6d57c930141331c39e032a284b59014646dd9054be213fd973e75a2269466a8a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      408B

                                      MD5

                                      e744920e6d40a01f6cc9d35cd17ae724

                                      SHA1

                                      345c8fce6f43602e57ad442c4865a32dd26053f4

                                      SHA256

                                      41085d49ef45e321e2f8581f8f170d37f8d9ea8db14cf2e86ab72e2964569562

                                      SHA512

                                      cb9b64c440902e9d49a9f81d6d6e289b1d24721f9d52f8f7f7daa458bd6533494f828937f663929e8e90d212e74239b3d87aaeab1eea6a9d055acb9a3e770240

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      3KB

                                      MD5

                                      d86b4598b62e34a4a352070dca36924c

                                      SHA1

                                      3ac4468f335f59fd9a01a5ef81ae44e68ad8b658

                                      SHA256

                                      f8d1e59eae22847cd746294479f179659e024f4bebec0f964b0c7db48c90dafc

                                      SHA512

                                      98d048ea88747814e067340026c9f088b50942c71599879b6ebd1c152d449d931ae8639ea93a2e1c5475684e322fa77ca5c34cffb689adfcc10c099703a2cfa1

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      01270a036eb571b07c746fe7b011d499

                                      SHA1

                                      8a77039b751d644d531b1f2c949cb3bf1170f321

                                      SHA256

                                      b15148bf4a041cc732788672394a7dfe3fdcc532d297ec86d44a67f30f7be9a7

                                      SHA512

                                      39ab9f1888fe72cc35c8a6591e5f4062d6b8a9d9519f2e008d3fe9b71367a3df06971d4a4bde2859fd154ee4ce2d85b9e53fd1449677c77528110f0031d6b568

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      d443b69813b48fff1b364947140c5013

                                      SHA1

                                      d018192afbd6199d786122a519c21ef4ce448d6f

                                      SHA256

                                      3beeef71032e5b1894a3757b4be763816ec01697c96ae3967c3e77de81cd013e

                                      SHA512

                                      baf1b06710508292f0ae359c33e83a91fe80f0327b9d066dd03928883200bc093518d6247eac194388d008eccc6569a5cdd5e30bcec9394d3b93018e6e157f60

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      4570f083636e3bb01fede31d34911bb5

                                      SHA1

                                      be1eb871be010bb551a555b0c0f8a69ce8b9e402

                                      SHA256

                                      bf3121accf29edcf4fa5a33d7686d5b13a3a8610409be5a8e00af6384d5b9873

                                      SHA512

                                      a6303924411ff5ae739c8528cddeed5d6ebd4e65d1bb51e92eaf4ada98cb594febe98453e5e9f4f20b040b78e586de9216dc076a838bd434d1454ba117e26283

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                      Filesize

                                      24KB

                                      MD5

                                      852d886f30a60b001ee9e16d15da655c

                                      SHA1

                                      713ae02473e2af931fb4455db3be07a00c734e97

                                      SHA256

                                      0c05a4e24bafde15c1c9cfa778ac25eb5552c22b1a589b7b473eebc752a6ca68

                                      SHA512

                                      09625a70076a264b7138dc14f2fe81b0e8ad6cc0ecb3cc4f5d5bd73eb58fab1e2528c5e3a3a40837740895a5a694b94b2fa174a8595960ef122823a4132d4f73

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      a1a35910318c8ae1e3986f4534f5f12d

                                      SHA1

                                      c8f532c46cb19846b39d4691fc4be881e677940f

                                      SHA256

                                      85b4e079e67d5175131601f6010deee39c48c9be3b408aa2ff0764460e93b256

                                      SHA512

                                      c1fd377d23718ef7df3ca910699e2c50831424d31f46a99a5a3a3db81aa50c3fa5e8389d4d7258f12b64c774029dacb69a1b346405b71155d8a96accab883f65

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      1ea2129bd0453e1ff80b3e8b0c91a69c

                                      SHA1

                                      9005a8dd2f34b22443a295ff7926288d22eba615

                                      SHA256

                                      4ece5046ca5663839d4d080fe23e70471a79e837eaf67d60889e3711e9e4f3c5

                                      SHA512

                                      c1a34064e3998b5674688cc72d3b81b0c014bdf2fae1ff075ebe0bab826d97a979e9d59ae4c7d93d0500f2eac3cb2cfc56aaa28c61623bc7faa20163d869d562

                                    • C:\Users\Admin\Downloads\Key-AvastBreachGuard\2024-05-03 10 31 37-47621.png

                                      Filesize

                                      306KB

                                      MD5

                                      a4bc8f41eaa296f774ace5d0dee4961a

                                      SHA1

                                      bdf9c400f2a93d9ad8be657592eb630ab1bfab01

                                      SHA256

                                      550069fd5a6e6184cf0c1feb3a92e543c6949426f8db1ee26f8260a86456781f

                                      SHA512

                                      0a5c0903713ea93d7d08445ddb61aa7fb9a72ca754a02013f22cfbce06003837d6032eddd2b89d57231cd33b0771e2c9c53f059f2ee10b8190bcc18b557e5fe6

                                    • C:\Users\Admin\Downloads\Key-AvastBreachGuard\Avast BreachGuard -6-5-25.txt

                                      Filesize

                                      1KB

                                      MD5

                                      8ad9062ecd10a44b1ec2d64ffcdfda54

                                      SHA1

                                      14db60e8bdb8cae16cab01479eb9b4a56eef7b83

                                      SHA256

                                      18ccba23a29712822874e93c573022124cb65cb76d59dc035e384f1c9bbff6f5

                                      SHA512

                                      6a3dd0af1b4d33ff1c66087627bbd4e5e38019a95fa57d98991a50a74909291ac34760263b12b21d3ca051c6007c0900a6656c3f7b62098a44910dc66de0d257

                                    • C:\Users\Admin\Downloads\Unconfirmed 709690.crdownload

                                      Filesize

                                      317KB

                                      MD5

                                      4bd93d20d4b4ae33078bb0683dc0c95d

                                      SHA1

                                      2ffc57fabda0ae1a0fbea9df488022f725a398e2

                                      SHA256

                                      13351ff7f9fa8baa3ad2a4415c2ef482fcc0b869091ff0dcd55cedda20011747

                                      SHA512

                                      3b8e5a23d7dded9236d7c4283ea0a37f52c286f320636c1d85074182cfb090c365e40495196988eee5c7a317860545e4b591a401cc2e49f1200feab54c958b0c

                                    • memory/3880-251-0x000001CE535E0000-0x000001CE535E1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3880-249-0x000001CE535E0000-0x000001CE535E1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3880-247-0x000001CE53560000-0x000001CE53561000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3880-252-0x000001CE53670000-0x000001CE53671000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3880-253-0x000001CE53670000-0x000001CE53671000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3880-254-0x000001CE53680000-0x000001CE53681000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3880-255-0x000001CE53680000-0x000001CE53681000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3880-240-0x000001CE4B2A0000-0x000001CE4B2B0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3880-236-0x000001CE4B260000-0x000001CE4B270000-memory.dmp

                                      Filesize

                                      64KB