Analysis
-
max time kernel
34s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 10:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1FpaGt4cHykE7y7N_bBIrzgPKhM459WUV
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1FpaGt4cHykE7y7N_bBIrzgPKhM459WUV
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 4 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 2876 msedge.exe 2876 msedge.exe 208 identity_helper.exe 208 identity_helper.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 768 2876 msedge.exe 83 PID 2876 wrote to memory of 768 2876 msedge.exe 83 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4056 2876 msedge.exe 84 PID 2876 wrote to memory of 4736 2876 msedge.exe 85 PID 2876 wrote to memory of 4736 2876 msedge.exe 85 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86 PID 2876 wrote to memory of 216 2876 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/folders/1FpaGt4cHykE7y7N_bBIrzgPKhM459WUV1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa6fa46f8,0x7ffaa6fa4708,0x7ffaa6fa47182⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,18208484889144945948,5208700048246574491,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2760 /prefetch:12⤵PID:4508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
28KB
MD578fbaa6c69ccc961b8ec438a8588001b
SHA1990c7f85fd6739a39ceb934cacbddd8ca7672627
SHA256708cc85c1b714f37d78a73e237276b2525f644e3e5ab935d7671368f21c2d4d9
SHA512c9b167bc97e6a65745576831721bc21c1ebb4ea9545643f2af6e7b4879b5930db85991013a12a8debf645f3b152b9c27afa619c245e21d35d9cd66b1347a0aa1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5cf1c19b8ede7eb35b26c50e15fc135f6
SHA194502b21ab0d98459e5dc7e968982da6f2df7909
SHA2567b5e800b30aea69065eb090f50cec6fb4826e136d1955cbe242eb6616944aa81
SHA512a9841b0df348f7520ce0e301c76611ffa9aed8c71927aa2c13763cb61893d45ae95100e53c8f68ee3e8911c3727ca00225b71586a05e3117074e0b2e45264969
-
Filesize
6KB
MD517068e287e70f657fc6bc21dde0d0017
SHA1dd2eb1e3589001c4c114393bcb7db7393dee2e2f
SHA2568e20f44da74d13f31b5cc1db8047405d8c4bfd4fc7d6bf1ace241581c335d844
SHA512cff9dc8587feaf4e7c9449b04abc8536089c3eb5a4cbe3f1aa4cca75e085bf0e820ad90843761caaa2fb504538cf6519da38d2a85e68c66a1df39d374f495faa
-
Filesize
6KB
MD5ceec9e520c7a262c80076fdb824c167a
SHA1a415d47b1717af6e19d4093dfcc3de76971476ff
SHA2566c9616ac030e7846a6bce7e5b819c54acd3fa21e081725bff6ee82c612838d27
SHA512a8d17df58e7258363cd1d0f693f97f7a18e4b088aa1e6e9e8212cde1e927023f202ec5fa3e9a1bdf623cc99a33ec9eb20add8b5cecce9601e76f505d200ef028
-
Filesize
6KB
MD5ebe0d06282c3844c41dec0a7dfbf095a
SHA1dc82d2d0cc5a07e7e5681fad2e54c07b0e8e0a1e
SHA256ad3b5853ef9e19a1210c90246d7a9a9c7cc94a8686bf40846c54219e8d995ec8
SHA512436328cfa9a36b9e2dfb8ace17af9cbec9edf83a6e5cd6b824a4849fbebb5cbbc8c0e126eef2a044e6eb777e0c5f52958251b7012ff125f728fe79857cc1aaad
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD579a88cdda7521d526738ac5c0e1842d1
SHA188e9356d19049e64d5d1600e4d12ba8e3d0b7f78
SHA25662246d0278f26d7bbe423bfac0d4c54668463bec962bce952129a762675f81c9
SHA512926f25e86a72aae3839f96c942bd0a7e45c0f063b4aa9f62fdbcf14fecd726a4b5a22cecb0bad2a2067a385f977e3b22675e56b8606841aea4981ff3928d59a9
-
Filesize
10KB
MD5dd7746e3115999cd5732d99dd6dfbd63
SHA16a8c5f41632cdc79951dc7c638961c3a672a1a24
SHA25678de501ae472a76da94353a5335f78efbf8ddad1e1c4e8d07d211eaeb0a2355b
SHA512229216800839896a96b43d89a27152599f3296092eeeb544ccc0e95466b4cd5645b09c36f0751e5073510353a2739b6fb4883a69b7b271be37d2d9bd662bed99