Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 08:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 14 drive.google.com 3 drive.google.com 13 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 1656 msedge.exe 1656 msedge.exe 4960 identity_helper.exe 4960 identity_helper.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2716 1656 msedge.exe 86 PID 1656 wrote to memory of 2716 1656 msedge.exe 86 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 996 1656 msedge.exe 87 PID 1656 wrote to memory of 3216 1656 msedge.exe 88 PID 1656 wrote to memory of 3216 1656 msedge.exe 88 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89 PID 1656 wrote to memory of 2312 1656 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/u/0/mobile/folders/1PPIHNKNQOrbqj_D5UxDgaV6cqaIuqMzx1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0dc446f8,0x7fff0dc44708,0x7fff0dc447182⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2348 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15641766410861698602,4040245609307149346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5abe58f8b30cafcd39ad2977c5fbba7b4
SHA1a6aeec43c4c47a632d302c3e805daeea5b23edd9
SHA2567db2e9007fd86262d3aac8ac3041837cc03c7b743b54148a4865d4d6eb2a84e9
SHA512d8acf3cfe5d80a18f3a74c68509517db040e5f1bbca32dc47a979ab59e17034a5431580e9829c5082cb0c4aa39be4dbebf0273e4bc8fa0fde2a6805d294c1fb3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD5d4f51cef7af776ec6423e927f99249d6
SHA1c89ed1cef0054d94239c2ab6ce356f4db1490636
SHA2560fd39d74e0ae7368da7a672d43f73c4afe980b39688e3f455638ee1b3261ac36
SHA51222dba1c599290ba68fa08a45a1482ef1b15ef0b8c9def33bc681e439ec28d9bbedee41f8ca870c8025db70a2cc7a33cabe28a40bd77910dc8b287fb152d9f2aa
-
Filesize
3KB
MD518ad6faf9dc9c1eec63bcbd2c2f616ba
SHA10019a7fb2f1634afb874d4b2474b96f861c403f9
SHA2561ef7b53fac0b2ae69114aa9f368fc6bb927e221ec057014deb6dbc77ca349760
SHA51211f14c62dea30a1edc4a0a45a0ae8e4de73d2a6fafc3bcfd51c56e4ee2dc0177e69d0e5b3925be21c1192635b20434caa2061d70c80725a34ae11709ff663a2c
-
Filesize
3KB
MD5682ed94ef23751e759c5dc34ae025956
SHA1e7d21c699823363cb33c7587946315f65d2e3a50
SHA25664370988f03345a14352d1d796a76321354bc0b5b11dcd1c00ec1e5f68c4ce26
SHA512d7fd26b629f97ec4d006f66c35dcb1bd84c246190aad8fddabebc013dcaa1781770e871ab132b83f84c5ef0eb447d227f8f9244071dab94996f1b89ff2ed5f9d
-
Filesize
5KB
MD58081c3a9ad8a6f57cd3ecf7f216a4bd8
SHA1eaaf67ed7ef84f629b421e83c8c339e347697113
SHA256b37dd854319d66606991da9ad81f2223c615435913dadf465e8e6ce5e1d92ca7
SHA512614abc27be264490a1b29943081929fe22c5adf99aef0c71acf24b5355ef25b39b9de37c1904d3989de3094d498a0c20b417f8f339fbf5aaa16a675233a74efc
-
Filesize
6KB
MD5d9543c7154158f982f202abdc3024827
SHA14363681a95c41e04027b25c0c08f3b5721389c63
SHA256aa45689262852dafaa84e741a531f4c9c7288df14b176eb94db53da394fb19ca
SHA512881f2b327f104ba2374b96fe30f1c12426ca853ff780ab924e86e81f4b4dfda7933d04ef97bba9b99f15661069f2e5f93cb3f3123dad36e9fd91571b8b1a5385
-
Filesize
1KB
MD5456d2e65729b0f4b9f9661d2ee3dca23
SHA14d44e754b781617ed694c48faff6d9d4feaa8187
SHA2560db9ffe4ac593c10d4ff2d4cd9c9731f3e24fda51a3ad1769c1cf4566bf36b69
SHA512d8a60007c058a7a0b0a321d955d34d5ceba5ab775c832dbd1969c5f0b13443ba491a51ee2497dc004433edf27ea0e599623a1756b7c9b91d18b706462a338d00
-
Filesize
1KB
MD54f624d58ae0781db06ca44facec7e40b
SHA13ddf63af693863e50570282ca64d1ba1cbc169d3
SHA256b8e9d63c42ad5c2e3a0d11b5aa6dd2a850f6a7fe34b85e09079329dfa08d8297
SHA512aae699fcd401075ed038b74ba768a81a339a73dab6a700b6e5fe009d9e01087825344a90666f592f51a2ed0cb22a3d23f25dda3345cbc8c3971b850b1c1db700
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5612b7906f755fe4596eda1bd7fb1c588
SHA117cd912a80f135a2e176506e30fe82a31cd23059
SHA2568ca8e98b52f3e94ab591cb9eefee7afea3536a2965dffa28c84776ab8764efe9
SHA5128b23abf8dc8cfcdb5951af4ae042fa261715b9c371792e10a166742e8e4c97db2a274d1d1bdc550e058ef92b5772ed84290e63e1cf7e403c2048e71c0de7329f