Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 11:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1eQFe9_wHxydHOF9QD2NaYAzpvSWaXX_r/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1eQFe9_wHxydHOF9QD2NaYAzpvSWaXX_r/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 drive.google.com 14 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 4964 msedge.exe 4964 msedge.exe 3972 identity_helper.exe 3972 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 3864 4964 msedge.exe 85 PID 4964 wrote to memory of 3864 4964 msedge.exe 85 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 2956 4964 msedge.exe 86 PID 4964 wrote to memory of 4684 4964 msedge.exe 87 PID 4964 wrote to memory of 4684 4964 msedge.exe 87 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88 PID 4964 wrote to memory of 4656 4964 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1eQFe9_wHxydHOF9QD2NaYAzpvSWaXX_r/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1fdb46f8,0x7ffe1fdb4708,0x7ffe1fdb47182⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,6470383210263602416,12760019678411869196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
1KB
MD5ea15c87170d7a5311e01c618b9269c85
SHA1e90d04bcac60396ad009ca76d936419eb604a88b
SHA256a376c8bd67093450fc08ce5996ee7fb6e1dc978c022aeee737b8dba84e5b27b8
SHA512d9b52e924a5a526d924d3f4920de1affdfc83c77ea9ddca160cca7cd1e74ae1db57e446472d1e831ea0cdd6154c85dda2481b780a96c124547523b87a7616a27
-
Filesize
6KB
MD5e4b3a02561bfba80b39bd61596556985
SHA12e3e77d05eab9eb248d9f57ad81b84cae9581ead
SHA256306bd1eb6589110bc95acbf3f498455e9c7ae65b84b725618186342fb01a27cc
SHA5122f1dd67adb94168217dae5493e8ddbc27b8ad3a8030ec2c61c0391d73cc1a19994d2d386d8dc1d656408fe1bcae22e6e4ccbc2b4535f861d535777092bc1414b
-
Filesize
6KB
MD50e65661e67c04c8b720901a4f1d05cef
SHA138386b4dcb9f359c7121adbdadebdc0a5d3bed53
SHA256befa9776c0d2bf05995e6a4d41ee74b5b55754548fa6401c9e80b3e4da62f367
SHA512eb3146be26b13434657b588d66c3cd5c9b3292d6d01bdb881834df7913321192bc472a9aa38de2feba7e042e9d1ec43ffcd95fa90ac1128a49f05ed8091e5c35
-
Filesize
5KB
MD5fd1179d02cce5476a2e59de44dc78324
SHA19a390a9a7c7ef2cf841c53e1670762eb959a78bd
SHA256365334c0806c30a7d3f83b6ecd5d3bfc9efe526c90da1d71a452acf14db16481
SHA51230e461555f68831bda25476f1d1ed16b03719997f4816b51b10792706025e5ce28a0ad7ddcf316c0a4ae81d2ec6545f90d0c570e42a9927d3c9ae71b7d72e434
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54c07a5be9418342b382f0e4fe4eaa6b5
SHA169f8ca2374c3ea369100cd98e07fffc206dde6f3
SHA25640c03520b6281391d048095f070f3df8d4a2f0da3234711171f1956cb17dbe0f
SHA5120377973294e195b1d657b6212f13c0764160f906f9b515af9fe7f6d1a348528ac27276792105c333abeafa9d79e49ed430f56a832609a403d15d0edc1fa977c7
-
Filesize
11KB
MD58141bac0132c072e8d805d2a44237d38
SHA16bfc9f3c5c38a8df7f443550b54b72936c82316c
SHA256b626110fc9eef303c6b1ee2d5b84ef9c84311fd588f0e0b215f5db6291679714
SHA512969de8dbb4040d5e309a25233fcb34ed12a80405b593fd61b5e6c414d7f03249751124be8c11b44e9b12a7f04e933bedd05e04e05346cacd2f23276a64503e6f