Analysis
-
max time kernel
22s -
max time network
11s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-10-2024 12:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1Uj_ifzOprNGNewfa9oedxQCeBqxbwEnP/view?usp=drive_link
Resource
win11-20241007-en
General
-
Target
https://drive.google.com/file/d/1Uj_ifzOprNGNewfa9oedxQCeBqxbwEnP/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 1992 msedge.exe 1992 msedge.exe 3568 identity_helper.exe 3568 identity_helper.exe 5720 msedge.exe 5720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe 1992 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4668 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2932 1992 msedge.exe 77 PID 1992 wrote to memory of 2932 1992 msedge.exe 77 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 1160 1992 msedge.exe 78 PID 1992 wrote to memory of 5080 1992 msedge.exe 79 PID 1992 wrote to memory of 5080 1992 msedge.exe 79 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80 PID 1992 wrote to memory of 1416 1992 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1Uj_ifzOprNGNewfa9oedxQCeBqxbwEnP/view?usp=drive_link1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbbd233cb8,0x7ffbbd233cc8,0x7ffbbd233cd82⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:6140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:5704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,3506855426686688400,14418694100771921173,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:5684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:964
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5003b92b33b2eb97e6c1a0929121829b8
SHA16f18e96c7a2e07fb5a80acb3c9916748fd48827a
SHA2568001f251d5932a62bfe17b0ba3686ce255ecf9adb95a06ecb954faa096be3e54
SHA51218005c6c07475e6dd1ec310fe511353381cf0f15d086cf20dc6ed8825c872944185c767f80306e56fec9380804933aa37a8f12c720398b4b3b42cb216b41cf77
-
Filesize
152B
MD5051a939f60dced99602add88b5b71f58
SHA1a71acd61be911ff6ff7e5a9e5965597c8c7c0765
SHA2562cff121889a0a77f49cdc4564bdd1320cf588c9dcd36012dbc3669cf73015d10
SHA512a9c72ed43b895089a9e036aba6da96213fedd2f05f0a69ae8d1fa07851ac8263e58af86c7103ce4b4f9cfe92f9c9d0a46085c066a54ce825ef53505fdb988d1f
-
Filesize
5KB
MD52bf6863c137c42bd7f32ed8e66be9c4a
SHA1b04999fddee110f5589ced0347071761741b0d57
SHA256dd97745cd5dda43e2282700914033aa6cbcb4626fabba5cb7003284ff0e8d5c0
SHA5124ee9a83e9b4467e302ecb17b9ad3a18653bd8d5ff19241c5b20fdf3a7fa19c48415d43478d57c8a86ee5489684ce785ba69be3c4207a3d02eb3518f5d7617c5e
-
Filesize
6KB
MD53569f3862f9ba28a981e038fb5e448c8
SHA18ecce6adf7fde27b4fbfe99b63e91f00a7838f18
SHA256b15834ab33a42382faf7a8003c3c0fa385b1ad9bd92bef7d8fe82d201ccacd1f
SHA512d7d0de5b3b8ab69a97aaee0665cd809aaae728c6133238b4f94aef504de77d4a21086f92fca4c4e010772432918507d81229207aa65dbaedea98c59ac58604fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c6a7a1fcbabacd627498fae321c87599
SHA1227289b66fd2d9252acdfb0f3cd312f604d39f04
SHA256e03deb623ad8e7a5aa6025d03fb1164e2c2321617029287ee912408f0be879b0
SHA512e95c98a70ea4ce7b60559c08f33f8a1ef669dfed2bb0ee8b3b6c58f2ffd93a34c4e750443e349a2d7593ae1922ed0049b97abda764a9df865a2184e03ebf6618
-
Filesize
11KB
MD52cd3b6e64f2328723983783e42fdad9b
SHA1379edeaa0a61146176d1670d0020397f2eae0999
SHA2561ec981def52f1379e318ed39b9580d9b547bbbb084d675a0962dc1e652ff7f07
SHA51260509cc20d0f8c9ed0b7dc6bd9ecf410cb80e0f768b2ce265cea3000a2d4bca090a49201aecee30c8385b8793e1808255ddde01f057a6adf4d0f389e460950dd
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5b7443e89f0cb29d51ee6a257750e54d2
SHA184127eebf275e781d5276af6fc4d09c5a6bfb7b9
SHA2568226877d6ab2e4834aea6bc71bd9865b28d0bd1ec2e8b4c23b8acf0301c56f26
SHA512446cfe25d82f3bbf7badd324cae691ad62e13bd7469e415f47b9141bddf30679219c672937f4f6768796c2936c3b9c557fabbda1fb51c5edbb7c1964bffa17be