Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 15:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1yRQqAxT33bNyAjZg1Fpga3uyc39sk5ma/view
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1yRQqAxT33bNyAjZg1Fpga3uyc39sk5ma/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 2204 identity_helper.exe 2204 identity_helper.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe 864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 4560 864 msedge.exe 81 PID 864 wrote to memory of 4560 864 msedge.exe 81 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 3764 864 msedge.exe 84 PID 864 wrote to memory of 4736 864 msedge.exe 85 PID 864 wrote to memory of 4736 864 msedge.exe 85 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86 PID 864 wrote to memory of 2936 864 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1yRQqAxT33bNyAjZg1Fpga3uyc39sk5ma/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0c4c46f8,0x7ffc0c4c4708,0x7ffc0c4c47182⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,5134774798946428911,6986496163732149241,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD56345d88118e8edffe45ebb6cccb21132
SHA179383ff333dfda15f28d047cb0b9773836399ad4
SHA256d3dc5ba243e025fbf96c2f91d196ceeafe2b16de6edcd825ac854f44d4b73bdb
SHA51227944b52f7cc7b2a74b1bee417ae69de78c4d3b7c796ac028daedbeffd5c49bd79b4199ab8c7e8456eeb69995c43997f19cc646214f644355d42a56e9186b4a8
-
Filesize
3KB
MD54462cc7fee83e4b212a58f12835c4f30
SHA186b0dbf2d6f676e42356964c44840a5c70a95935
SHA256bcf13785fee2631424e7b4bc1d8f3227230d9ebf5cba837efca8ab6b0752feac
SHA5129a0f7b8a6a348435b82c39e5f814156a4865389719e7455698a33271c298fd890c1f5bfbce49e72923afad62167af234dc7ed372138217784e5d626db9820bb9
-
Filesize
3KB
MD5cba1a7fd4f25a6694828af213a69df66
SHA12a38f3dfa28b66185301862ca31d59673e03e420
SHA256c11fdf282e495186a11332a287bc4b6b032af9f48c61cfa0122361a542a7d978
SHA512f989938745a773172a83045eca603e5c2118381c2a7980ab47ced397b10743e1cf3078a2e82a4e29f92f9b209eada9983563aec893a06592425ef8645462757a
-
Filesize
6KB
MD5cf7c7b62f0afd88923221378dfcfd59b
SHA1b1939f8f58ac2173c78ab295c5430e5f89c3bf83
SHA256da546437a17e6aa47d6e08bc93a815466b35256fbffdd7375e9c9501c3afe115
SHA5120602385e95f82c2023aadcc940784b96c870aae05e13ba02e1c9be060753ed9ee5894d27331abdc27494c04808215f389f50df24c3d9121ede2b5c09cc24e8c6
-
Filesize
6KB
MD559247e13777d5b516f2bf210d70d0bab
SHA162aa2be927fece5c48f8153331dec58b6b222938
SHA2560891d4b77aaa7f2e9ddbac952e73d0adde0409b2f8ec930c76ef95d6e16dbbc0
SHA5128d21e8472d9b73763b77bf6f72a3679ccb9ad4a1176181b7482aebe222bc285236baa178144dee91c745481108e66c3aa465869da55d7b86725a14870005c743
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5306889bffe4806ad3bc80ca35ded425b
SHA18c7ec08072b975f4b6ccf16c4424fe92a08c683f
SHA256ab7a041f7c66a29f1e72af57fdb52d68b86d04e570d0e862f17d886cff71ddd4
SHA512cef06abdd655507d2cdef1c5e625c5ab925474697ddf4200544d5da47e45c780e324dfd2aca34fda61a1495a2f2b2452940e1a7467ea4fa2b6ffc58bda9af31d