Resubmissions
03-09-2024 13:20
240903-qk85csyfnf 603-09-2024 13:10
240903-qejbraxdqm 603-09-2024 13:07
240903-qcsgmsxdml 6Analysis
-
max time kernel
70s -
max time network
63s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-09-2024 13:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1Z3F36Gu-WNL3fGTAz_G1f4lS91NKf31j/view?usp=sharing
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/1Z3F36Gu-WNL3fGTAz_G1f4lS91NKf31j/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 drive.google.com 6 drive.google.com 1 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 1664 msedge.exe 1664 msedge.exe 964 msedge.exe 964 msedge.exe 4876 identity_helper.exe 4876 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1608 1664 msedge.exe 78 PID 1664 wrote to memory of 1608 1664 msedge.exe 78 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4572 1664 msedge.exe 79 PID 1664 wrote to memory of 4332 1664 msedge.exe 80 PID 1664 wrote to memory of 4332 1664 msedge.exe 80 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81 PID 1664 wrote to memory of 1372 1664 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1Z3F36Gu-WNL3fGTAz_G1f4lS91NKf31j/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdc0e63cb8,0x7ffdc0e63cc8,0x7ffdc0e63cd82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9577934945139862004,8368238165554245999,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5302c3de891ef3a75b81a269db4e1cf22
SHA15401eb5166da78256771e8e0281ca2d1f471c76f
SHA2561d1640e5755779c90676290853d2e3ca948f57cf5fb1df4b786e277a97757f58
SHA512da18e7d40376fd13255f3f67a004c3a7f408466bd7ce92e36a4d0c20441279fe4b1b6e0874ab74c494663fb97bd7992b5e7c264b3fc434c1e981326595263d33
-
Filesize
152B
MD5c9efc5ba989271670c86d3d3dd581b39
SHA13ad714bcf6bac85e368b8ba379540698d038084f
SHA256c2e16990b0f6f23efdcecd99044993a4c2b8ba87bd542dd8f6256d69e24b93b3
SHA512c1bc0dc70ab827b54feb64ad069d21e1c3c28d57d126b08314a9670437881d77dba02b5cca57ef0f2aa7f8e7d4d163fbd2c6f246ea2d51ce201d61a89015e8b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD56c6e7158cec6b7c067433f77dfbc6198
SHA1f01365914070e77dd5196afe7ee9f433d7341ad4
SHA256d0d02c2caf064d45d4e144ef3fcd516cf46f321b440b7c4223758ef518c2a6c2
SHA512eef34b81b280ae0f2a4e0dff1f08f2e370fa91f6da298c07cec4435e3a34cfbd4ffac8276cfa7fb055d5cf446f3ab8de4d8a94744ddc37f266a7f89c390d6995
-
Filesize
3KB
MD50e3df98bafaebdc2cbea4721f5bd3a14
SHA19196aeaaf49c2a2b4ba971803b7ffebc1935f56d
SHA2565b4bf28ab3c42fab810f42140d9af87311f3ca43af4a4dc689f0770246036526
SHA5123e7f3c750cbee0feae73df485dc76c94240a3eb74bce5d97aaf60abc640ab5e2b23c4d67d70c25867a0e9aebc82020a8def285ac81f81ac3196faad1e129e35c
-
Filesize
5KB
MD55e92ed533f823bd209bd28f4c4d75ba2
SHA1940e9629d0b1c3fff9971c84c46875a11841fa4c
SHA2568846543c3587a473d0046a8bd0503ae00072dbc47bf7fd62dd62e6c3ec394151
SHA512244fcc726f6b7f169a46e03ece6128914401bb21d481d1cb556a31595608f380f8d6ed1ac2f818ec676b2b1781be1e3c643b1d8761af6098b7193d697f1a6437
-
Filesize
6KB
MD519c532c553fef52dfd4ce18cb5c3e6b9
SHA12209525315d58e39c2e3b1bb70d102b835224f6e
SHA256292122cce15c39b15d13c615246f323b113b64978edf0596b152e74bf3e39a97
SHA512479c9743cc7b58ef069c157b83f49adcf177568eefbef0f2bb78650ae31b4396f02990828db35b4a98931a2282dcc92245080cc82e9a199471ee56685312bc9e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e8001b65407998905a0a06ab48b55bc4
SHA1a1be32683d667c0378fac65393c6668ae885b5b4
SHA256d6dddc2bebea48365ac2a15fe9be00fe738f479d7ecec161e027fc2067a8f209
SHA512382b9d4db08c9734fa95d1f32783a5ca93ab6d2f94266dc0095967a627c7de2a5ec858fae9a33ea91f9dc3404a91db21c6fa140f052109764086d86bb8daa408