Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 06:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1pu05BtbhyIILxjBTjYiID6xK2jZW2zw0/view?usp=drive_link
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1pu05BtbhyIILxjBTjYiID6xK2jZW2zw0/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 3492 msedge.exe 3492 msedge.exe 1868 identity_helper.exe 1868 identity_helper.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 3536 3492 msedge.exe 85 PID 3492 wrote to memory of 3536 3492 msedge.exe 85 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4404 3492 msedge.exe 86 PID 3492 wrote to memory of 4996 3492 msedge.exe 87 PID 3492 wrote to memory of 4996 3492 msedge.exe 87 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88 PID 3492 wrote to memory of 4192 3492 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1pu05BtbhyIILxjBTjYiID6xK2jZW2zw0/view?usp=drive_link1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb76ff46f8,0x7ffb76ff4708,0x7ffb76ff47182⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,4327807114629867777,7205968212399430808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5444 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\73a2844b-b0cd-4890-b30b-848a08c2c8e0.tmp
Filesize203B
MD517966f59d2b900b6ce8a3f3fdf0c29d6
SHA1ea6a7fbfcb6726c456d9441d501f62ff4eafce40
SHA2568ba9fa87f6490bcb096a27d9072f3208434d41dbbaa4d4ad4823715fe6e56f2f
SHA5129f4ee8fdd4e6b0438a214f385c045ac5c88970fa8545c7b143acf61f117d8fc361045b4821afade9501e134d4e3dd16a84fd38f9c45747d7a8c8670acee12dea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5217226b5fa55b6522a67d902b6d261a4
SHA193f1f18b20f2d5ad864a6d74a56b3e5f32fa168d
SHA2560844df090458ebdf9de789f1167b8d499c0d2262994506c35b73bd4a7dfa6657
SHA5126d67ccb4410ffd4deff80cdc8a7412112771dd1297f163ec4e9fc7a06eedb4880539c01f45d207dc294358b2c54a7f59c6bb89fe2967c116e1564bb48e4ca844
-
Filesize
1KB
MD5a7fae8c48de92cbb5c6f868e3b93ae06
SHA1872efc1e88f1b4e43e8eb637e4b46aadce854a03
SHA25646d0df529fb80477682a06ee67f33e3ac2ae1793cc034bca985395ab85491ea0
SHA512e7f94560f71815879d9b862abe3983628e879e3daa5770d4ac90f8717f38a63de4c7379a9c3203808cb1519433c121ab4d6ba7edd3be22834de322b33cee1a03
-
Filesize
1KB
MD51f3f9f7a80bcce7fade1238bf1e2779b
SHA109fda00ec51c98f04271f942ad8510fc186132be
SHA2560e52c47f1dc50843c1dea25030800cadcf1d682e4a3847ad4ba80f60cfe3af34
SHA5126e7d708a6222a6d1ac7264feb83ce69117ebb7956855fa3690ef6a4c6525c11ce48ca9a7fba03ecf5a8a17f67cece36868da5bbeb3700bc52c9f58c9a47ee4f0
-
Filesize
5KB
MD52c16d1e79f46bb4058e724adfbef7acb
SHA141990c632730f1310a95129dd195a1ea4f140a62
SHA256633459f3bf28ac784531366bb68f6adfc75f47b3d47a1096bbbbf94e625587b7
SHA5122690e431ada4bd55d0e3881f1f90adb570e8a14adb185014f101f432ac3bc4b2e20f339d8f6ba2d18a08e227462bbe0d7718af4c67e81ea9087c5ae5908c8930
-
Filesize
6KB
MD5ef9d036fd1f797aded131f8ce46efc71
SHA187b1c1d8ce72b5ef2b13a34643e12cf848c06d6a
SHA256a140b29f06a05b4f1bb08366936000c451c90ae70a5d39c71da537b33c426790
SHA512d0b69c9330d4d8e7202078480b4db342cbfbfd7732a3e2e1da8718e28d82adc555f2c526c34d6e284a3eada9c60850c605202c69deaa635e352d6f7d926e90d3
-
Filesize
203B
MD56c8aa4a51f826aa4ba73d0e0388ecb60
SHA1f171c69d76e10a274aa6bdab9a6785c56fd59214
SHA2567ee43f06af96e3c29da18374680fc1ff8c3bc7c65f10954288dabfc2193b13af
SHA5120783a1e60952357a5010aa4cd267dfb03a0cae15653e5f4787435975e7837efba7426eff8cd5781563a576a276be66b90966d4beeb37fc864fb85d4edf0606a2
-
Filesize
203B
MD57124e9041fafd7ea8334dad0d435dee8
SHA184109ddcda614e7eab1e2fd765a67c48a0a7620a
SHA256787773d225f402a7eacb437241b24542f53ccaad654b22a507771b91f8d9912a
SHA512976ff3b34f8cb607deee05a7d301ae78aca0cdbffa4acac9325e03e9dae4330cbfe6809df3f56a7d0d487441e4b91c224a958f8e1b9b8e497817a780113b7d57
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52bddefa06437790dab462df25bb0fba5
SHA17dafd7ab88e41b38be43cde913389c0134aa3b6b
SHA2566f993bd2bcedfc91e4b7e1e4088522a10df1ff56c56d4460d4896ee1f996da23
SHA5127d50b316ac88688434b1ccd1b6afb44e0f281b05b698d0c4db9d340a985c0f27a93dc1f039727816cd7886fffdf0a9d57e68ae51ce34df47d5c9356bf11b77d3