Analysis
-
max time kernel
288s -
max time network
253s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 08:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1BO5MdXPGvHfDFkLpbXR3TcLI8tMUm61l/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1BO5MdXPGvHfDFkLpbXR3TcLI8tMUm61l/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3900 msedge.exe 3900 msedge.exe 3388 identity_helper.exe 3388 identity_helper.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe 4724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3900 wrote to memory of 1096 3900 msedge.exe 84 PID 3900 wrote to memory of 1096 3900 msedge.exe 84 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 1540 3900 msedge.exe 85 PID 3900 wrote to memory of 3692 3900 msedge.exe 86 PID 3900 wrote to memory of 3692 3900 msedge.exe 86 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87 PID 3900 wrote to memory of 4912 3900 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1BO5MdXPGvHfDFkLpbXR3TcLI8tMUm61l/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb34246f8,0x7fffb3424708,0x7fffb34247182⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1372149674753687825,6161752301138563014,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5b6fd1fdbfc2cd5d50ce06a35e9548b0c
SHA11c8c94c4671ebcd9420c2a00bf042abd81ce0398
SHA256b5cb042ca33c8458bd229381bebb15dc9cd648618df01144948404c69572e208
SHA5120573699bfb10356f2af601b6db3035fea42e78ead17c8401584934fa4078680a373ce18ea088efdd25e63191af8cf9d18e24f1fabbfc4839fcecedb1fc2d0666
-
Filesize
3KB
MD537dd09aca632b8dfbe8f51031f92b429
SHA18923957cc79871b5b43cd1a9b924e131fe429a3a
SHA256f54aad34476f33541c6b238fab3637ae0879f6aa28d3723e0204029b3dbc9875
SHA512926016fb13ed757541a6a92320efc7cad0ea06687b4c77e877de39333e92708e5e9875e5c4d343ddd4c9ba601cc98382d6f1540d455cbf65052e53b0310a9316
-
Filesize
3KB
MD58cd4e0200ce0ce0acf2c7376b8b5ee2b
SHA10759b42072655d5359f2992114eddcc21540bfbf
SHA256f4f38f896cbe2f00b608e4d623e0fd6d186f828c59fc3f0bfe1588782e1dd0fc
SHA512416c6b995ea1cbfebb839be468af295952d16dec2be1011845f01a6df885b1c15b65781c1f91c26d72808157a2024c83431dba9bce681ab7832584b17abac614
-
Filesize
3KB
MD53d11fdaa9852491a33466ac97e455845
SHA106456f018469fcecff914a6b93b83e039cec039b
SHA2564da357ddc7c832e20eb671718146bdc3e784dac25c7a329b4e447938d8836060
SHA5120afe763d93abec161a85d2b2909bda44dbe0b6bda058e93743573a02e5c8c2f608a04954facc61e40e7ac5852424a1ceee2682c7c37d5bc4832cd13302cf1f10
-
Filesize
3KB
MD5762bc6b1696e0dd689e48d35e449c935
SHA1dade4e613cb40a77a1119ebdc49373d3149fb462
SHA25638d2794d64576699235f1ba4644523880096774b63a4389b2e537f949841617a
SHA51216cc5a4e3ed7e5a4ff63ef017cc4372730f1cc5a33923c91049abb5a71dfc3fb08bb6fbc5e87788ee5aec88535a2173450ac6e5a33904d02d04c5b315d0a037f
-
Filesize
5KB
MD5114bfbc1c5f1efc8a81b36cbecfdabea
SHA1587a5273849c8e7a6e0fb8fc3203311383bae727
SHA2566539f53ca14f7309b4760424e7a29b55498499f73eb5723ea5243097abef5035
SHA512d7bf21ba039dcedc7bc6c6f22cc7d594324a9145bc7b78da3614d77e039f76adfff32edfcf32784dea504f9a46f8ea661770dd43f5c2dfc84b77428155dccb13
-
Filesize
6KB
MD5d96ce5da97637b8270ff1637de178644
SHA1170e3fca623c43c8273ee17ffcdea48ce58fb172
SHA25654be098fc329e40c4f7826339943956f0204fae2b21ea166356a36fee96ecc34
SHA5126ad201583ca93237e344df70dba6b139aec412920ada797a9d45d9501c8c8fe36b05a6d96f6e031dd4a8ebc6bbb4d4086ddc2df21400537134e93428594e35ee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c6184b0acca9f6b5ce567bc1f441d534
SHA1cde01d7b0e7cb70197078c2406b5120f5144de04
SHA256dce89ee8bc63e0fe78ea3e64b4d6fa9914adf8611d9aa236144d7114fb635db1
SHA512e95a06008cd4562709fae0815042a722c583f25e8c68dbefc641840c4fdf82447471d2d00ae6f2bbe881d988ffe1eb8f276a5818da1660bca83cfeacf27561ea