Analysis
-
max time kernel
71s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 01:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1LJHFnfpocNGWPQSgaIapXCnTQ_Z-rv68/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1LJHFnfpocNGWPQSgaIapXCnTQ_Z-rv68/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 400 msedge.exe 400 msedge.exe 2224 msedge.exe 2224 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe 2224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1976 2224 msedge.exe 86 PID 2224 wrote to memory of 1976 2224 msedge.exe 86 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 3612 2224 msedge.exe 87 PID 2224 wrote to memory of 400 2224 msedge.exe 88 PID 2224 wrote to memory of 400 2224 msedge.exe 88 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89 PID 2224 wrote to memory of 3940 2224 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1LJHFnfpocNGWPQSgaIapXCnTQ_Z-rv68/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa461946f8,0x7ffa46194708,0x7ffa461947182⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15001754636884614245,2301815719772818656,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:4872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD50386ecb327769c019d238f6b8c9d6ff9
SHA1022eeb9e9bb244a02bd7f0867895c82d2e82071a
SHA256a35e3b92278eabf06b9fa923e63c0ad4979c7c3ffeaf0b0d5368d7ee1fd34c15
SHA51210a921023e466dc28ac8de7d2190ee4e683daf33817b9d2d99a53922f050271f85beb24f48a346ffe36535c6321d87e48d825b1253859797d8c6c806f5c02237
-
Filesize
3KB
MD5d37d292b5ed8018bbbe24cdee289e1c0
SHA138c9678ce779624cb757696d44067ccb538e61d6
SHA256d6c13626f41fc8dd1d0133f43024996a766d3750e169ac0a880532bac58204bf
SHA512ef2816cda755d3f5c1504602286a76e218e8a89becb28f172bb677aed4f08715879dc00ee961b3021857cab5ae14332b17fac5f830d4229e546e2d1dd2e2cd35
-
Filesize
6KB
MD55004a6e7c8426c603d44af853931528c
SHA1bfe49ba7b2f8a90a5cb96ebfa815c24d21674c0c
SHA256ac693382f4ce5e8792c12a226cead9e87ddb99841ccc7b5f650278f5c7fa5457
SHA5127c5a9b52a80aa8bead68a32a538ff86fad02c245652ee2b0b326e5109a7cf2d80bf780f1f3a9757a86554f8c48352b0fe03b25ca3a79aba2b3931aa1c54fcf68
-
Filesize
6KB
MD560687c7bcdff561599fbf04b61617f14
SHA1ecdb403aa57bbbdef401ba9be86a37cdf52b6350
SHA256e2f05b35da9ea10e8141457abe8eb64a6f1b3d6d95c82b558f5066d8e85d5fec
SHA512ccd5afb9d2c43a6228bd1a4a3dff638692586c013545845abf77ddbe2017f60f624259258bebe7fe3372b38679971694cdad7c017dd30363b0162692450e85e8
-
Filesize
6KB
MD54721b6846dd58b75a8197f9a6f28e13d
SHA126e577e834f880bba4eb6d6e4cd235e2712a20e1
SHA256f30b65b1a74dd375f360e27436fc812b49f751b2b7375139575c539774edf147
SHA512f19feb4386a2030ea7c8d5513d1b4df4cd4e7c0e8330ecd3c70936867be64d360a9c479cc2cedcae151e58141a1b1a51f51787737f5d8a0765c97a14b2c72281
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54196948a8069aed94066852d4ca99e91
SHA18464882c53f71a68ac07650dcc2324c9c39dd507
SHA2562d395d2ac42395ae670240b445347af03ef1bd20c0949c05aad72ae670d29648
SHA51270212d2d9fa22056d9b34c839c6afecd4759e2b107a53638bc9f9648185fff3e547088c7d262f1d95b82147f6243cf4c29b2ad47131cb3309fcf548e5cafbaa4