Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 12:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1FiyeiJbT7u5eB7Df6mUTLyiywtYmaU0O
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/uc?export=download&id=1FiyeiJbT7u5eB7Df6mUTLyiywtYmaU0O
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4992 msedge.exe 4992 msedge.exe 3916 msedge.exe 3916 msedge.exe 2156 identity_helper.exe 2156 identity_helper.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4992 wrote to memory of 1088 4992 msedge.exe 87 PID 4992 wrote to memory of 1088 4992 msedge.exe 87 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 5096 4992 msedge.exe 88 PID 4992 wrote to memory of 4012 4992 msedge.exe 89 PID 4992 wrote to memory of 4012 4992 msedge.exe 89 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90 PID 4992 wrote to memory of 1788 4992 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/uc?export=download&id=1FiyeiJbT7u5eB7Df6mUTLyiywtYmaU0O1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddeeb46f8,0x7ffddeeb4708,0x7ffddeeb47182⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17855212483033033530,15890476547362579094,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
512B
MD539f984207242ff4c8ea5a83c10586fe0
SHA12547eb2376963eb61ef986f19d872ba2d97d73a4
SHA256ee8b2f1b55dd7c96fceb5bc34fc0b63121c931b021fb290c856bd766e1bc1070
SHA51288d72a4dd90aeeaf8b0790a2da9806695bb6c6dd20ad0c65e0643358016099df28dd2312492cdba063c23c94657ef580873cbb0bf87ff214addf89e3921463f9
-
Filesize
6KB
MD5c601b679b3ec154800f1096fa87b84bb
SHA1b4d7c746ecc84b77d3f8df39f96898cc8fe21372
SHA25628b2da515e5344ea91f0012f28e3ef33407de6c698de81d4301a67fc3f2c9acc
SHA5127b1c501092c19e1ab0a87ca3f39c914eaa5fe7946779d6b363091bb6e2d639f8bf817e8db65a1e864388934b62ac92ef10a816910e1f06f706abcccaea9c87a9
-
Filesize
6KB
MD5869b3f127f3716e820f9e7e620c86f4e
SHA12eae797a8e409bc4650de6e5c06b00f7938cfa2f
SHA256f7bb9f47d9484aca5d10549c3156a327863652e46ce7a9b2e67dc55986d5c7b0
SHA5128b11b8a8b5b6c003138274959e8abd41bd62c8e8a0f316db4ef55c8e2b9cd2209728fab41165f5e6fc9ab0f88636a927c15ce9bcf7af52a5c769723c77031d3e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD546e5bbaad605fe1dcd8ab9a425145633
SHA16d5b8d57087ac28e5a055396678195eb4d89ff93
SHA256deb9ad5f5d9fc97fa16fd25d02792e299a73b61eb821e57f4ca2b8df3e9fe971
SHA512328150ec893345697220a35d614413cbe2d1c8674439344e502a9fab4762c07f4c1297f19117fa905cb4e1f3be71765e94c7e5aab8c118ebd5bcc57bf81e9456
-
Filesize
268KB
MD56b6231d2f6b9be0aba733275c7a852c0
SHA17aa81e420463fafa1a5cddd245995631b5020544
SHA25650662885fd210529cd1e2f87bd024546ce815220551700acbe2e95c9e03f657c
SHA5127dce035e8562d2e85738ad71519fcee5b6fcb6c3839c7756246094eb96d43d22d46b0f74cce4cc44e4eb9709e2c60f5ba2cbffe77661d7db7bac27edddc88c56