Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1p7RQl87qm9zA7acA1Z6h-HIWxqDPhzwD
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1p7RQl87qm9zA7acA1Z6h-HIWxqDPhzwD
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 1552 msedge.exe 1552 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe 1552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 4776 1552 msedge.exe 84 PID 1552 wrote to memory of 4776 1552 msedge.exe 84 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 320 1552 msedge.exe 85 PID 1552 wrote to memory of 2020 1552 msedge.exe 86 PID 1552 wrote to memory of 2020 1552 msedge.exe 86 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87 PID 1552 wrote to memory of 4292 1552 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1p7RQl87qm9zA7acA1Z6h-HIWxqDPhzwD1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe485646f8,0x7ffe48564708,0x7ffe485647182⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3988 /prefetch:82⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7672058324717569623,17411282977948923497,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5af29c28527d73260b6ac907183dc4623
SHA1056ed510f9f643abcd4200e2737e9a4cf9378385
SHA256664abd96af11aa616b8e907f00060a64d3ea782ec79aebb9914a21e3641c192e
SHA51275a5b21de4e927e4c6515a59137d97eca53f6d17dbac2d28c7bde9b768bda2531cd11ceab2aceec0332b2d13cf9bb850f3b4f50ec7d649d7adfc908a0b4e1fc5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD5dfc44676724103b0b22aa782c92293e3
SHA18e50d9c7ccb8c0c171c385c84d39d41a46086258
SHA256085fe59bf498b623033e70ef5fcb56c55d127444efa78fea07eeb8fa53d09254
SHA51264cd3be8f2647677938906a56e5ae23bdc7bc8d135a9adeebec8abfc8ea0861b5db20fdd7da8e58115fb4f0c1e55940bb23606cee9a31e0b81cdb58d47084b0f
-
Filesize
3KB
MD5472d3e727237370f4affe075e2e08562
SHA1202577dd27fe89fcc33da9ddb14362304fd5347b
SHA256908036519bea5c8e0ef0cfa3a2afaa606072df554f63c16a5875e34d7264b11c
SHA512560b7a01694e2dd60cf8f31abcde0da6a3adab0a3eaf0955ccf33e313b762b6e40482cee91d5cf5b4ba8594c234e4afde259e3e997ff52a630e7f8cf800fbe7b
-
Filesize
5KB
MD587ffff900aecbf4021f4464193c1ef31
SHA15709a384c999d5932e6ae1dea5ec391f73d2df09
SHA2567adef8727488ec48bd43613bef9781484eecfa7a1944af889fa97c665c0a960e
SHA512355459015ff6059511874b9272ab67cc538825662dcccf8b5556b584f531a4fe494c34f3de7e7823152ab272d0f60c1ff803842378b15de9a2b7ead46baaaf76
-
Filesize
6KB
MD5efa723e6b3a33250d59eb8d8c31350fa
SHA12e1488ceffb0545cd418c93b0167d0e2c10a2088
SHA256fdb141f401cac674c20f64035e916e8b9694ed99ff5cbe749a332d04170c73a2
SHA512b16aacfa73a79e23f8eaa9e67250f3f6a04911dffa21ae1672d76efd223b81e118f6bd51710d5a29a181399357d2361c79cad5ce8c107552fdad8fec3568ef45
-
Filesize
1KB
MD53bdcf6badae51ba59890455d88e17583
SHA155eab3dda051cb9fa08e247e50980b494fc015d3
SHA256e26951d1ef313a87d6a31b7eb61d6315033b2eafff45c4f6f4c2190b5262e0dd
SHA512fe597e6f871123179f7a54a80b3e594796e5af879592d2d808d9c636a2a777c5e1fceeeb4fa4f6a8d5da1da934c024f5cccdf33a884b0571f8919474376fddc7
-
Filesize
1KB
MD54f4f4e0050f8ea3e638009e82280a3a3
SHA15b6449e808ccba058049b0125d09fef666f34b47
SHA256cef6d384dc2660926f418a1b072cfe764afd83495bc5b1567011c5e4d94d9c38
SHA512b7a34a2041f48fc0b798ac0affc6778276e27ab9f42ac1d1743e774afd1d9cb8696d91a0060b24a4f6cba5a4ad2b5b99311c77fd31945a0b065d438c022d5205
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52c11f81c4f7f095b84f3a555cba3c445
SHA11b75aca73c1c423ce4f4dc43db61f624dda8b610
SHA256855cc1155c675942c9ee0eb72443e67bc587e33acc9ffd11243d9180e4e92a15
SHA5128cc44354d4df5751409924a1f4e78c6835c7051ecd600be05710b6d7e52d51f9f5eb71ea8258759338784c2d45140b155e520672f0c7869a467db3f2027fff04