Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 05:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1tzp280_yK6gZe-aEgQd3lm1qWX1pd0Cm/view?usp=sharing" coords="157,806,444,850
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1tzp280_yK6gZe-aEgQd3lm1qWX1pd0Cm/view?usp=sharing" coords="157,806,444,850
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2788 msedge.exe 2788 msedge.exe 3736 msedge.exe 3736 msedge.exe 3336 identity_helper.exe 3336 identity_helper.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3216 3736 msedge.exe 83 PID 3736 wrote to memory of 3216 3736 msedge.exe 83 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 3200 3736 msedge.exe 84 PID 3736 wrote to memory of 2788 3736 msedge.exe 85 PID 3736 wrote to memory of 2788 3736 msedge.exe 85 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86 PID 3736 wrote to memory of 1216 3736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1tzp280_yK6gZe-aEgQd3lm1qWX1pd0Cm/view?usp=sharing" coords="157,806,444,8501⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1a4646f8,0x7ffc1a464708,0x7ffc1a4647182⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,4739057925524773007,16010161503873817192,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD51d3e1b075e67aea766493eee6136931a
SHA1afff9a4cf517f030dba84ec7fa117e146b87ed6d
SHA256b8921bcccd170d06564dc28d8574160c0873b96393f1d7e18b917b719aa6bdab
SHA512c1bafc081274e2d863e67d0eb4a76d1e853bdf1e3fabc41b436c404b270771eaf669586c6ae96ef538df42f21d1935f408b5a86d2735ac0cb2f5174805ca98cc
-
Filesize
3KB
MD5658a2836acf107b5943d0487abc5f7d2
SHA155293b24250c401824599f6dca5c86b6814e8673
SHA256c96b7aa63f7d2877abd1b22284e7a77371978f590852a789860aa4237b04e246
SHA512f09a56fd7f7a8b00a968ad7266df61007734136322078388c6e014870f2980922e5962ecff79173533c6e353ee4084c09e26971d07e5071668bc9e8c05622a8c
-
Filesize
3KB
MD5e6562b6e0d0e02b9bfcd19e2c0d1f73f
SHA1c6594fe0deecc1a2c39eed94c08d0ed5cf683609
SHA256775e6c92bf1cecdc5db23a575e183236175f7c6124f9eeeae7272763c2d145e7
SHA512fea8c62e4efbfcf563d2c75607e1db1a0e76f91cc2de8a2bea22af251888b0bc4a629f8e89ddcdcc4b2f76d87e8cc0fb70ca69dca3ab538f99e4f15d1e7ccb54
-
Filesize
5KB
MD5dcb5438175513bdee2e69229bb132c0d
SHA17a2390a77d15a7843dc26afd48787e3aed8aa571
SHA256b0f65ade7b3d29fa7dcad95f5cb102c2a7fec7e9ad55a8fc5a7f7238969b3a22
SHA51293268043a6822840f5337506def57c4ad882e43e819f31c3eaddc3e6035595abc33028422f70819699076ffa474acf117357087e7516b590cb6565fd1b32ca35
-
Filesize
6KB
MD562b9493c879ca86253fbc875c5242d1f
SHA15a872f25afe3ab48e32a342bab4107e51016f300
SHA25626f3ccf8c4e061699a892f2dc500b908557d4194f3b4f72988cebff3f45a25bd
SHA5128416330e6b5a276bcb3e1b1be6a9866e4314d5ca4b92480992757bbfdc90518a53cc226dec9cb8876216f93dfb595c37bdabf12043b258155c62b7d8c57cb08e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c7b78e15c3bfbf80962df86350796813
SHA15dc626ff510a1350b058927ab1c054ba428c59dc
SHA25694ed3df88e3b97d7272b3d5ff4ba928aa53d3774ad5eb5e356ce638b3e4c205b
SHA512f7356567da16de4bd8277c8021704140b7ac8012c37b6c15127284505c3e6553d46a067cc9cddd2568e63b1479ba5ab5415579be2b3b646fd97f3af9f6e9bb69