Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 16:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1kde5FNsEYfLvV35nKP8V3jv0L_wIzFlm/view?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1kde5FNsEYfLvV35nKP8V3jv0L_wIzFlm/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 2124 msedge.exe 2124 msedge.exe 3120 identity_helper.exe 3120 identity_helper.exe 6008 msedge.exe 6008 msedge.exe 6008 msedge.exe 6008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3124 2124 msedge.exe 83 PID 2124 wrote to memory of 3124 2124 msedge.exe 83 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 2832 2124 msedge.exe 84 PID 2124 wrote to memory of 3196 2124 msedge.exe 85 PID 2124 wrote to memory of 3196 2124 msedge.exe 85 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86 PID 2124 wrote to memory of 2776 2124 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1kde5FNsEYfLvV35nKP8V3jv0L_wIzFlm/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb062446f8,0x7ffb06244708,0x7ffb062447182⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5262973627817140304,998155347100956019,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD52761c4215739ca11941f160a42684afa
SHA16b341ad95630d1cc27ce9594960bad2a77312e99
SHA25682b0faad3a8e98cd4b9bdb77454040b325ec0b2c756eab1af62cadbae91459c1
SHA512d4f61cc387af41517c8c270df6cc0d460460d61f3e74367896770d9b383479a5904565d19cdf648bc7c9de3d9b04810d3faa6f93259575c582c7716cdb8f5a37
-
Filesize
3KB
MD56523353f6997e184bf804bff599ace39
SHA10a0c8b0f62a7da8231284053defe4d91143eca02
SHA2566c1f500934aa100e3395a53a5d8b19e5438642b34dac57a9b8cfa60651df456e
SHA5120ed5a9b62456407263f7bddc1d014a14622f00e83aab59eb4b02a78f958ebc9f7a5c39780eca7d2da97b1f6dad543b7b68d413703e54e5745dbcd5c45d26dce6
-
Filesize
3KB
MD58e631f05319853ccb81c5b98b202fc5c
SHA12dcf1f286e3ef98a0cd745a0c9395a119341d5d6
SHA256c89e61fe0f31705c40081e0dbcdf181c81474d783e9170be90a6c2cbf72330ae
SHA512714c8aaafe8944f27602d1aeffb9255f7d4177214e31b758d1aafae8e93a021e90e1949276f5b07751ac3c3b0d1b3e5695a7a6a1e477932eca4b5fbfb634111b
-
Filesize
5KB
MD5b1381d5be5f73d111c4a15e4d76b6d23
SHA1282eea99d1641e04949f42bd44ee79695a03952a
SHA25625e449c98704c4a2fa2712ed34a7b6309d7063880290bcc8940969a2d233d8be
SHA51264a2658a46bed2d19a05e35585551cde6f6a60245a92ca7ec957f5cc2b5faedeaa52dc1e23e5b2f673ef76a9b88b90e9cab1a0b5e6194366393af123c3b9b9d2
-
Filesize
6KB
MD5901e4aa0e3425f132faecc21dc81453b
SHA181d5cc610fceb087277c92fcdaa9db450f363062
SHA2569baa36ed5626b9dddbffd8855e51ca58ad3de9b897c0b2962f8f2e2a8ee134cd
SHA512b4dcfb8c4aa9e98b6c3360a6873783a8043618d88947de829a8dd4bc00c6589d0a46e98628bd093c4b87a3c66e6caa23a880a96d82628977081b0d35aa8dbc3e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5614c3b9ab3e275acd201e809ef3e2231
SHA168e384934a11a182f6a0514b8048dba34df9667c
SHA2568e4adb5be92173fa4c22f87091e05e90d22dd11d0bc7b4a0574cd6c309a61c1b
SHA512dc8beb3d64bb26ee0d96b652ef806ae4fa69615d10942cd9e8b3e33dfb98214f5f422b671b5d10e2ae20cb09f45252de5f73ad65b3ea2667009ee8136d428cde