Analysis
-
max time kernel
136s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 10:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1a-hGy_uqAI0hFC-SzrZzc6FlSsLIkoLJ/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1a-hGy_uqAI0hFC-SzrZzc6FlSsLIkoLJ/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 12 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4708 msedge.exe 4708 msedge.exe 4864 msedge.exe 4864 msedge.exe 3832 identity_helper.exe 3832 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 5920 7zG.exe Token: 35 5920 7zG.exe Token: SeSecurityPrivilege 5920 7zG.exe Token: SeSecurityPrivilege 5920 7zG.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 5920 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4636 4708 msedge.exe 84 PID 4708 wrote to memory of 4636 4708 msedge.exe 84 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 1200 4708 msedge.exe 85 PID 4708 wrote to memory of 4548 4708 msedge.exe 86 PID 4708 wrote to memory of 4548 4708 msedge.exe 86 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87 PID 4708 wrote to memory of 3864 4708 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1a-hGy_uqAI0hFC-SzrZzc6FlSsLIkoLJ/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb974046f8,0x7ffb97404708,0x7ffb974047182⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6312 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14143767299560107882,827611984678182818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5876
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\9key Avast Ultimate-2025\" -ad -an -ai#7zMap11694:110:7zEvent167501⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5920
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\9key Avast Ultimate-2025\9key Avast Ultimate-2025.txt1⤵PID:5972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5180ffa502469c0c6c03dd709246d7703
SHA113133a580009687dfc82da85ac9956d4c23ecfef
SHA256438d179a3fd0879904cf59ea962095216bbc01faa299822a148a233ea7e267b0
SHA512ad83810f5f106dc7a9769d530a326cb4398ac1a484ea7c52ed53159a1d8938ba183eb6f5dd11ef444f7d4f4bb3b9197602ca365855ea8f512f1906474a9b59ef
-
Filesize
3KB
MD533dab5b161a0f9a7011c3ab2ecf33d26
SHA140c015b9fc64cc739dd34bf8dddcf04065ff8d81
SHA25651329adb14d85ea480fde0069f4fd31fd12eef9d0c6351743ac9cc24fbe26b85
SHA512c1e17e122365c7afc3deae4b6217c3abd5cedd4386e588e733114b0ea2c98e68d31cf9c82a85a7aa3941acfa9e88bd0f6fdb2e195420fb3aab9a2a4e9d9b9962
-
Filesize
5KB
MD5f1053ace5864c9c0ac9782f4d476dc9b
SHA1eefba0a7adea3f1dd191f168e67241f9a04f2d5f
SHA256b448967c303edcf23fc21696faaf71457cc1d2485a09b5c7491d50d63e9f11aa
SHA512e5b6bb9cb13b2b225c872c4381b808c4b6d33e1a42763d6d4571f385638d45f9a1ce5b8d4ed4a364aa2da807d08be539c423ed4cefd2603911875b5fc93acc7e
-
Filesize
6KB
MD5becdaf7ec6ccc82d36802c4674e84634
SHA12006139a4c4f37f1a1fc85734893d8ef77b8bb4b
SHA256708376d3851cef138c5542281b4b135a0ee1b1287be29a3bcebdd6c3bf439468
SHA51228257079c6d1d175e40028db5ffa06477900a49dfac0c0c3bc39c0c7319c87e4d5a04647935bf1a7fe128a229dd696536a26dbe74265bf3001ab57773dcf58bb
-
Filesize
6KB
MD58eba6b12c85fc989832f297c57abaa81
SHA15659cbf8af722a79ae65e044eb43c679e4022f98
SHA256e76391de1b38b7a0deeb628cffd8c43b6bf5cf3b32a17fc6a8dbae914b8b28f5
SHA5121085a819fd7139da50de40783a50fcd58acb8f5c22b6ed234d7c2e35e71ddf907f1a3f00e52891ac05aab1d06912b68cd7460d9d4dcbf2468c008f02eba8f00f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5093a492b2b99abda9990a1056df43b68
SHA19dfea2c74d3201f1952628d9c39641d2e9b02f37
SHA256f20c6b3ca5e3d145bc708d8ee0614103de835f27156b14b52ba116b64dad2783
SHA51217d2466afa6fa16d487405b2a961f8d3e5a452e7b7cdb900d77cb79c3bf019cf2d4ce8b57b572cdc17ecced2c98911d4cff48094f9f0affbe6df458d609ceb62
-
Filesize
11KB
MD55c3535018e6e5375a3ce23ab66db426e
SHA17a7788ccfd5086d06ab86261ee8c72576373510e
SHA256686b91ee3fc81263b7facec3a17e229315f313f8f1b81bdbb230e2b6a9f4e69b
SHA512555bd00e1b6f4ce25966bf2eeada2b0b1758b478ec28e9383d99e170d4eb8665980cc39dd6da120fdf34a1801692dc6af39aa0594382e7a2c8134111a93ae5f1
-
Filesize
440B
MD5aca8c12201553825b1b9fa25f34306d6
SHA1b2e66adf6ca18a70af6f7b20f26339dd49060ea2
SHA2565b09995a6df858f7e7198799d4a5e8c56e72497975add2aa0b02bd7b09576956
SHA512929bb891a52565f968022f76c0571c7a250de6fb97ad9b15534e81504b3bd5eaf205ecc705e32bf8a113b00450a5e862996c3f044cb3f944a524b737ba178654
-
Filesize
649B
MD5c14de90b5521c5efaa9bc1218c148317
SHA114756c35c74d88c46975e1c8c45ffb75ccc033a7
SHA256555fb4b0b21aa44dd85685e34d69cf01eac9dd44aedc84a0835e6407486a0999
SHA51285b759bfc3671a84bc737dd473692a28db8b5d803caa7161df0c8fe96d4b2ef9b3f472d0850c9a3ee6493f07bb5cab2f4f38ffef7b56c428c45d7ee2b8bb8687