Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2024, 15:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1uTV9TjBbVZ-_Cio5UYTMlefABYgSOPVz
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/folders/1uTV9TjBbVZ-_Cio5UYTMlefABYgSOPVz
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 3 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 316 msedge.exe 316 msedge.exe 400 identity_helper.exe 400 identity_helper.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 316 wrote to memory of 3488 316 msedge.exe 86 PID 316 wrote to memory of 3488 316 msedge.exe 86 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 3312 316 msedge.exe 87 PID 316 wrote to memory of 4924 316 msedge.exe 88 PID 316 wrote to memory of 4924 316 msedge.exe 88 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89 PID 316 wrote to memory of 1520 316 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/folders/1uTV9TjBbVZ-_Cio5UYTMlefABYgSOPVz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x110,0x114,0x118,0xe0,0xe4,0x7ff82e9a46f8,0x7ff82e9a4708,0x7ff82e9a47182⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13856933149208128776,2895388643431979894,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5c5d8a84edbfd428f61dc8ea837bf5a69
SHA12d949a1ad3ffca5d6b99eab639166ab90382f576
SHA2564cd0ee277d9e554553e274aac3ed85489b4b7acfb850cd6a3b5b76d25c429699
SHA512624c6f6f46aedfb722340f38903bcdbe2342f83b50c7c217da35bf384c6bbb8e778d288cfaa0e8391a9fc84f1bbfe35dcc4b1bf9878832dcf8cd000b7b17fa18
-
Filesize
1KB
MD56bb1e85faa392ed3806afc0d9d89a1a1
SHA1195ad77925c0065afcf198c1722adb21d35bd5e0
SHA256dae4ef433365c147f95ef837b2f24e062d8cc2f819f7c5e41d5eb5b2e1c828d8
SHA51285efa8f611850f6f3908b60680b27ffe8194ff9be9c6d3aa6d28db8d992067cfb6cb94bccf7ad3ee0098db611a89e5bdc3dfb35cc869e77f0e10fda7bb93db0e
-
Filesize
1KB
MD52b707fd2b4d4fcb879dac9f312abddfd
SHA1480a5910a78e66c8cd8bdfbdbd1933da2cb8f622
SHA256bc7dc4d92e3e3efeccdd49f0f107ec2753432bd16cb6d83052f53762515a7583
SHA5120fe261be209684f87d8619cec461cece9842bbcfdf7b8c45cba083866dde38a4ad36f830fb61ce0231d77014f4de3739f64d7d5d14a37f2334bd5b385777abbf
-
Filesize
5KB
MD548b3bb8e7e244b01966125eeb524487a
SHA14a5e0c5a9017a7423f3a535f8c7027cb80aefc63
SHA256fc597cd2752679d8eeead20705d5dd6a3ec3eb5056bb2e89d763e7b8eaf4cd9a
SHA51244001c6f099dee9a2966f31ae9070beb12042ffc3e4b3c89f433655573d3a16516f12a1946e6cef81824e280921dd06a23a199150534905a614f79f83d868a0a
-
Filesize
6KB
MD5bd2b881b7b0c835ec8f60925fc37392e
SHA1539a79ce6a640f65c30bb122de4065f2f21fc9ba
SHA2568e43dcee161c437e1c0272f4be495014306e60ec9c0b06ad2784a104719563c4
SHA512341a9b69d6f34a6698b156dded5674875a501c7a79277d71806c2e928fc779b8776fdaabefc17a840aab9b956b6125d010fceb2b3c812f734ac735c282de0be1
-
Filesize
370B
MD5d0f45d9d429c53c9aeeaa28ba5eb2fc3
SHA14deec004eef5d12013408bd3904ef8727ec50b7d
SHA2563cc58a6874bf503efffb964ac213d4a525c3641066dd004f04acd430e6aff5db
SHA512a1da36cd8a1e12a00d43acd986ace60d580e5b77b249e2e4d670881aba6fc1d466564c1e9c438c120c34910ef988b273f7d1275e48ee2764d4dbb8996c918908
-
Filesize
370B
MD51baac28897c8cddc0282482ebb0b1b38
SHA1e0569510e8f85fef2bfe68b2b8096f8b05eac628
SHA256fc5855304d768cf68aa8f58e53e35780f425bf261deb76db1d41768d8b826c77
SHA512d7e59afa92e8951cd0b27ff48caeafcd596cbec85b41562d1cae33a9e2799ecae6313fc4f09110d9f5ba16976205656f93792f27659386442e0b68a72b2e4d86
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a85a664851a3c385d0b80ab0f9485b6d
SHA14891364fef12a5e4efe5452ae8f12f6345c15b0b
SHA2564f60f111641137224a2f2bd42b01644d5687cb0fa623fa81c69278b5299e79ed
SHA512c3691d216c0e522c8f143a571bc91b1b22592fafdd15a46f389f75f6cd84dcfedf7a59fec7e2ccbf8797265e598d871e21568a4309afecdc4d1d10c1d6eb3be4