Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 14:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1xz3alCkZ_BQPcvkCLm1xK-EW5fAes1X3/view?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1xz3alCkZ_BQPcvkCLm1xK-EW5fAes1X3/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 drive.google.com 9 drive.google.com 14 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 1912 msedge.exe 1912 msedge.exe 1544 identity_helper.exe 1544 identity_helper.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 836 1912 msedge.exe 84 PID 1912 wrote to memory of 836 1912 msedge.exe 84 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 2816 1912 msedge.exe 85 PID 1912 wrote to memory of 4000 1912 msedge.exe 86 PID 1912 wrote to memory of 4000 1912 msedge.exe 86 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87 PID 1912 wrote to memory of 3068 1912 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1xz3alCkZ_BQPcvkCLm1xK-EW5fAes1X3/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1c1646f8,0x7ffe1c164708,0x7ffe1c1647182⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13016841475810875271,15907802162190335965,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD50facd48953a6bae821c92ad069cca211
SHA1dd5b36948cb96767a845ddfe3a21247cc9b9b519
SHA256c157b569b52a8644b22e2fb0ee63a689d5f76d1db52e22616c366ab16289151f
SHA51286f68154d9892e64cf5bea9828902cdf93a69fe334a9d2b6b844209befbeec9d3910619df3b1e83a18d7650a81fd26fd1ed0d70a0f20b09f9f78970b26245619
-
Filesize
3KB
MD59ddec98a4cd16285a28f62c1e10c8143
SHA12b6ac51910312238084a4e56ef3df24f2b257e27
SHA2564c585d47aad0cbdb3aba0f23b7d3740997ced17134e97c9d5a18e91b956ba90b
SHA512f903fb8a774e935613bb8e611bf484cf262f3cf8d332e153fbcf90b454b16c081fecbe92e70a20696b14ae6990d29a831120a46207d99b07f8190a4159727838
-
Filesize
3KB
MD5162434e25ea25c3762f600c8b45a22a3
SHA1da32ad8a118b214055e1177bc36f3fdb880fd78d
SHA2565e0075204b6a312c82c3c5f02f2c175d5c0950c9d6536b49037e113d5e2e05ce
SHA5126f1e34ca185b143c78ce4b9268148d1fb79266039e6e0fe21f36e23fd982eb698067801f7d90cee702dd9afa264be0f8645362cdb245b20e546bee970a4ac7ea
-
Filesize
5KB
MD5b62da75a1067c576600ecaac49c6a563
SHA14e5764be99b152203519152040bf286b08c6c83e
SHA256b7383730d294fcb5212a6e1158c9b89db49303b0b9901abf200cddf173a869ce
SHA512d8df391fcde8f8af8da6f257ce3dfa52ab47665fe302e50e2212d75d83636e5250a1df27cabb566aaf508f09982d6c3e91bb10200d2e93e774f36937ade90ada
-
Filesize
6KB
MD53b101a9e996efb51243a9f1da366c2de
SHA1dd5f47f64bda045e9baa48aab5b31bab7147e597
SHA256f3447bab640c5125eaf129f6853544b24013f741a1ca47a4e3d36170edd833b2
SHA51297e9a14902b3ddd71d1971b7a9343bb24e28a548f9ac9e7dbc1c0bf4a40b8764c851522bb2eb12efbaa66296fcf4ad0dd8806c643c80e01d96470dc80fb341f7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5af56ba836af9f286d1a07c7555f3381c
SHA19bf19ba6ddaf0868e5c9347be6b4a857949ed3fd
SHA256a25487beb035fad51a597127007aa7f627e0cc17f9bc9ac07eb1f13188bec9e3
SHA512f5386950301d7f63214357786c8c232135641882d8aef2365e054acac627f0a5ebae54f937ed958dcba4a1268ec45a0f798837cb507559fb1fd16ad92cd7c848