Analysis
-
max time kernel
362s -
max time network
370s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 17:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://drive.google.com
Resource
win10v2004-20241007-en
General
-
Target
http://drive.google.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 drive.google.com 14 drive.google.com 17 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 2228 msedge.exe 2228 msedge.exe 1692 identity_helper.exe 1692 identity_helper.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 1376 2228 msedge.exe 86 PID 2228 wrote to memory of 1376 2228 msedge.exe 86 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 3260 2228 msedge.exe 87 PID 2228 wrote to memory of 1520 2228 msedge.exe 88 PID 2228 wrote to memory of 1520 2228 msedge.exe 88 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89 PID 2228 wrote to memory of 1940 2228 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://drive.google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd747d46f8,0x7ffd747d4708,0x7ffd747d47182⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,1643192497641305962,211806729881532607,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD551510f8fda2b58999e7b150090b65d7e
SHA1c0e2bfa0723a2cdf805ff98af6a4d6bd01afaf8c
SHA25688d583e333c9b7446fc7198535a5eb2ae8d24ce5fc27281f8b28cb9f37b0093c
SHA51289b7d57f6889518830251dbab187b91e8a966fae89c955c22dc043e87c45a24e530c845fc128d3882602ee7c44fdae36f58a8826fc59250617c9a29b0c08e051
-
Filesize
1KB
MD50a02b3a7e6d2d328792780cd69ed1108
SHA149da2308405e48430487d7d2acf91203f6a5fc43
SHA256f367289731805f1af9f3c3e4bc4ffc14e27ae1e6e6b0701aadcf14742c3c3285
SHA512eb21eb8030178dd44cec7544151f6bf085f827bbf39352a258bfa7b4b8a54cc2d56fcc0daac5c5f396431559e6cdb8274a092a332ff36230295818b243d448ed
-
Filesize
1KB
MD5be0ff24fa17e8a3345fcac914e8a1ea0
SHA1d5b2c8850ed2706714b1982982007ace4f15c3df
SHA256e3122af18dd8eee96ce49250f598f06e13b601c01c4c86a38114a359aceffb70
SHA512158c273fb0890f83d89ab36338631c37c39f0da35a01124fd5e3dc66b796c2d2cb53d20dabf4c7708bbfccfb2310ae5470fac74fd62f0ab0503346afd2733f3b
-
Filesize
5KB
MD5fe0239489bcf18f950865c3ba8cc8c04
SHA165c7d63e4c673c8a390da3ad80000ad6529564cc
SHA2564ea529578e73ee49a0f37138abcfb5fd5fbe5f5215ead7fc418f9a24f783ca0a
SHA5128eb14fcd50d4cd9c755ceacd128049a3798af984aa7c91ed069c8eb2055dcaf9af033f4cbdae9f7e96bbeef70b4c7e0ca820aa31b54138a3cd7308cb6a62a634
-
Filesize
6KB
MD5770679b1dc2e82fcbf43e72d4b7249d6
SHA1684147584331a7bfdaf5e424396acd6d47c7a15a
SHA2564c3928cab6ac846ac2bebcfa8309b162310902b9ad52119e92220547d3fe0af5
SHA5124d37623938e645dd06411513780b7cb60799fb7402216232767bbf0554d716748b71a9f04c31436b678709fb51c1c2954d0fe17d2d5952b630bf506531a3bee3
-
Filesize
371B
MD513c38128b1010a4f89dd9528556ff9a5
SHA1a0a499d5b7e0a314a37d078e42c8cd6633793fc0
SHA2566add0b557bd5441841eab59f3f6d942214f2349caee41e570773a45fcddc5624
SHA5121d99cae4350d5ccc69c3c64ff14c0f292d22a1da5b90a24c4d3af2ded5e081b3f7311da8a673e4c36f1c81629cafe668f788993270c2d38a5d35bb3d2bd2bc90
-
Filesize
371B
MD511013029d1f16c539521d24c8bef330d
SHA1700308b3f06c1867b8653336c29ce853c71cbcb0
SHA256b921868f3243d7a0bb2d151bb48f133b6f65b744aeab4a0c745618612d2237ee
SHA5123cb5b2d41541b6327706e316b515fdb9362683bbe230ecae805106840fb83b7509fe313b85f09d9171753c79b29a0f802c20b4c27453c34f517b684362ee66f8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD548b112828a2e367f5d74dc7da857f921
SHA1631c6ed9e25a9ffd013327f134820e8f82a31ea2
SHA2569cc3dd1c00a4174d1554644834ec86c526c8a1a1351cd9354fed526b4f19857f
SHA5128939257df69a90086d00b6645447d7927ccfc68dfe3d7ea249ec7394d98e2bb037277788b6264d2b2c04bbaf0cd818681e410962e721ae482cfc84c52fd91ed4