Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-08-2024 17:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1-6ZKVx7JXgpJkfdocEQo-BNB_bfnMYmV/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1-6ZKVx7JXgpJkfdocEQo-BNB_bfnMYmV/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 1740 msedge.exe 1740 msedge.exe 1488 identity_helper.exe 1488 identity_helper.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2420 1740 msedge.exe 84 PID 1740 wrote to memory of 2420 1740 msedge.exe 84 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 5052 1740 msedge.exe 86 PID 1740 wrote to memory of 4100 1740 msedge.exe 87 PID 1740 wrote to memory of 4100 1740 msedge.exe 87 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88 PID 1740 wrote to memory of 4508 1740 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1-6ZKVx7JXgpJkfdocEQo-BNB_bfnMYmV/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdef2a46f8,0x7ffdef2a4708,0x7ffdef2a47182⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,8497878486267734474,975932957387574208,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5fc9328e9281594446bc489ba44b1d387
SHA1c25250388028f922441d73c623ba6e2f289fe092
SHA2569e9ec37e008f51c9ac3be52ae7a72418ed14bd606c0fa2c476f74916a7804f14
SHA51256be1e9668280b212dd0d4d287dd27cfb8279717356095974963f468551cdbcd4996d222e4965327ec1a2d8683f736e6fabb13ac2a0d369124b6f68d3a7c7dac
-
Filesize
1KB
MD5455ea6306dc4935aadf482322086009d
SHA1ce3a5480bd8c4dafdff92fc3564d6f4e3f37086b
SHA256e2527e2b69ec36710cf18469ea7dd964201bfc3eeb1e0a42bf17f4d27dd0d79c
SHA512ca8a885a4184c3b80cdc7ad2c2f194384321e19f1ceaa7a9bd77443d05b70c54c6323cf03826ccbc5054e7b440c3dc190f8feb104eef4f58febf277cefcb661f
-
Filesize
1KB
MD5d07d3a04f64566580595ac2efd19ab25
SHA17dceffe63108b6a7234bbc3126e8c7ba1ecbad02
SHA256a1dcc76111de86920f5c395177bc656edb076fd1435b95ebb9c0ded36f6e14c2
SHA512026a99eec051ffc33307831153a58267b8d4b40d7a32aa8b74594b0583e7923c9f65931888909a3d9353513d5eb900d0a299a7ecaa71c5c6a9bf79f7a00904b2
-
Filesize
5KB
MD59e141a6826096d50f6a21b56f2434ba3
SHA1ad6ede3c7a9452081ddda9b59ff5352bfb7405f9
SHA25627708cc9cd8d75f46f4885210fbda40bb3b73fbf41c2e4e80ca5b2a988da27f7
SHA512bc693e2be106346deb588ac2fcd292d372183626c37f6ff29479597cf4061f4c5d0e2c92f839c9ace20c52402a88efd2d7f28505eee48bdb58baf0e5452d8457
-
Filesize
6KB
MD53d3021cbb83c34436784bf3da47c3f38
SHA1f982ea9ad382c931e1f122f64f01102d999ac6d5
SHA256ef7c06a4efea7f61a5a4a693087d24fab2fe30df59ce0fd3bcea6e842e84584c
SHA5128a2a934118a51461f4d5508e507973d3b34c98c7f9f718c359387106cd338d50b5eb6bf2c431d8ebf450d75cb35076f2d339ac3c884ae4a972675ca796fea11e
-
Filesize
203B
MD53dbdfea9e692e752a52d613dba359cf5
SHA1effe24a63f0e8fb9ae03ef52ee7b1b45916797a3
SHA256ce0503ee39d3651505bb18d1d1afa39ba625fcf74c22d889ec0a35c3332e35d4
SHA512e869dca55f64eb9a5db62fdc63cc75e9d0cb4e46b8be8042b1ab9e27a8137c1f49c20693f22b1baa33c1b44dcde3a49c35ef37b22cb6f1342a65954b3be7d225
-
Filesize
203B
MD505d7872fccb6126d0292836933d55f87
SHA189bdbed156a7b5dc46fecb30ca0794b2b69a7ca6
SHA25670a5396bb9c22017f4d282a4676b8ada4d47e89ba81f5b2c50feb7bc57abd54e
SHA5126ef4f3149862e12fee58be6a578652f63a9d3be2366186c6847160608654dc6a8c13754e88899e38cc4ae17c162fded1b0c44d76ba5e40dc685b0ae0aff7cc90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59fabaee239a0c93fd45e4aebc805fe1e
SHA164b7730f952c461cf046297b5f8adb6ba43d0cfb
SHA25686e8bbec2688938b61017e26d338a1deeafe08cf11377d4c1284ac59121d036c
SHA512903cf6a54d3504e9a25e7a1ddacfd21493635f68e05071e75f0ff035b7d582b06e7e7fa58c9064512d11533c86d05b794bd21289cbdfb32c6d768d75279c6246