Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 14:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1iW8EdKeRcl2fPOJAW9hDpg6Onm8GOC5J/preview
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1iW8EdKeRcl2fPOJAW9hDpg6Onm8GOC5J/preview
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 3372 msedge.exe 3372 msedge.exe 1928 identity_helper.exe 1928 identity_helper.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3372 wrote to memory of 2488 3372 msedge.exe 84 PID 3372 wrote to memory of 2488 3372 msedge.exe 84 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 3536 3372 msedge.exe 85 PID 3372 wrote to memory of 1724 3372 msedge.exe 86 PID 3372 wrote to memory of 1724 3372 msedge.exe 86 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87 PID 3372 wrote to memory of 4212 3372 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1iW8EdKeRcl2fPOJAW9hDpg6Onm8GOC5J/preview1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8983846f8,0x7ff898384708,0x7ff8983847182⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,8162310372961999312,5434901321084356120,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
1KB
MD55cf969c2980feb6a77136a4059cd919a
SHA1a4ac854a5ab5f0ca3efe36c8f10db0355cb6433d
SHA256b1f7618e8d03e8aca745a63468f7ca087b28e568b77d1cdf264c644c7fac1226
SHA512baf4f5be4c70dfdf7d4697679e92c8018b23b641e52124189589a86e544cc392de4d856fd9ad19212771cd8d956d923277fe6a83ae0c9950553ebf099756c129
-
Filesize
6KB
MD586c9b7fc5f852bf05d5b7eeee4ffdb6e
SHA1e1164b936aed58dd077ba696daafbdb766df6ef5
SHA256993cb001bc6027cbb241939cfc60214ca56f8ed3c100baed383d5f6cd71f0849
SHA5127b07e30aa88f302614e7fd2d8c5daab2fbe57b58660289b1d22688bab1f375c9298fc57fe142ba1530b658fb558128c2c60d83a043b9a69aed3589a90b5729bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d89db13d-f5c5-4b47-8496-0cb1744970a7.tmp
Filesize5KB
MD51a38b393a361b6280cf626d9cd3fa05e
SHA1e78dde53cbb032e22aabe9433388159a317c9238
SHA25667c0d318f3ffe817e1895555cb8c994e0374536f51e9837d0c60b90095cf079e
SHA512ca0b7f3b1832cf3c612bf07ccb8e312ab99f0c4e34feaab2cc9302a81bc943009ae8829fded980a6c1a8c1483a8e3ed7d1a71097c556bbc43162fc4b9446ca08
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5369b21d8d44054de2a8161631ceceaae
SHA13ec2ce91c8fe11ce6025d49d036420da5c35137f
SHA256f8222356fc6a6695554eb8a482dd5fbeadcd681cf9c667c0bff9625ab4a34dc5
SHA512742917045f56534f901db3faef0f113a19cfa4639a80bb950b77f3fe28c43ff9a80917a81db2abae0b3b20917623670f676a63966881106c2150332c535e253d