Analysis
-
max time kernel
26s -
max time network
30s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 20:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1_XfBvS0DFFeTNh7HzyG5pBN2CA87uGww/view?usp=share_link
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1_XfBvS0DFFeTNh7HzyG5pBN2CA87uGww/view?usp=share_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 3408 msedge.exe 3408 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 1164 3408 msedge.exe 84 PID 3408 wrote to memory of 1164 3408 msedge.exe 84 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 3604 3408 msedge.exe 86 PID 3408 wrote to memory of 4052 3408 msedge.exe 87 PID 3408 wrote to memory of 4052 3408 msedge.exe 87 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88 PID 3408 wrote to memory of 2024 3408 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1_XfBvS0DFFeTNh7HzyG5pBN2CA87uGww/view?usp=share_link1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc36c046f8,0x7ffc36c04708,0x7ffc36c047182⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 /prefetch:22⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1856,16566485660686617592,9108119410239119886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\73c0e10f-35e9-438f-9b43-35daa660dc82.tmp
Filesize5KB
MD54ddd79099b9f5a7793cb9d5ab922472e
SHA1267d01013d666a9e86ff5f6eddacae8cd3410d6d
SHA256a7b03938775d14cbfa8d0ced2b438019f6fef167d001953a304990eca8be2098
SHA5125cdcb44e8f2dedc0cc9a2ffe10c8083af458396e2563fc11a972fb98aaab2b3f835916b3c3a8a31f249cd62546def95adb55862277571c5b17b02d4fe66fe3ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD52174a1a3b18ef86371de0839117ab514
SHA13ec460b3bc644ae039b24b8b6ff6f8897a01eb4e
SHA256fa993ad847aeb95a8edd91c118f6f79863f520226637380c7ce9fe78f2d7aba8
SHA5122236ac1ce841f2067e88016690417ee1099aedca332d30dd3e3beb2b32c29556ffa5140842a04f2ad22cf1c3e3335a14ae2ab624610c74d6d54001f58cc57a30
-
Filesize
1KB
MD50d462252ca81c84f98bf407052accc9a
SHA1a3ab4dbda7fa9775864c0f00a8a7d32f546964da
SHA256294d8e23cdd7e8002f5af0c933d356b6c56c9920c88f687e34f3eeb7e278e820
SHA5129019b7501a3e260aea6f18fa54af7ad275b0dfe50546f0f527152ecb881b1c702724d062bf67720398a0fec6175cdf84a21daf04249b717961e1cc7926c07f89
-
Filesize
6KB
MD59f4a744a4c68479d611ee48f56de6a40
SHA16eae49eadc2d115259137edeca7a38f19134a2e8
SHA256c7294af454d03763809f21d463df4f3891b4b81e649203d926266023e78d8824
SHA512eb214ff5c54223a0fb0b3ffa8f89d8f4975429642d388a35219830915fbdf006269188a64edac1103b3be04cde3083dc39b35893bf638612cdd4a01720ff976a
-
Filesize
6KB
MD50df774981697692cf678a1f421790284
SHA17710a57b1ba6fca195a6b83745bbc9154b6eb756
SHA2560490598689e7342a458e02ba3c1f419ea51bd887c537f932778ea06d5b20db58
SHA512296c583d9cc524dfdd1f52469f3b1eb08f665039e8a8fb9578e3b8edc74597de9cb3d3e98405c3bc1399952414510bff1277a06d8466e467ecc4c1b6bab726fe
-
Filesize
6KB
MD5b8a478633057284db59da741fe7c30c0
SHA1c11e1dd18b9fc5ffd6fe10a23f83b642a405d902
SHA256511276f0fa5400ee015124c0851c3c86bd2b618b6b2cfee93be48f84cfd7486c
SHA512a92b7340dab7b2fdfc81f7edc72af17dcf5d9b55a8934ac03b788840054750a5f5320a85e0f8091b3dfa8f40f1cef3b85846e0844bb36447c37a4124d4f8e782
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b15d0d9aa408219066edb092239022bc
SHA112953eb0782ff6e08f25c95f471261b8f5b6001a
SHA2566bfe1358b01b51b594160d1a362b6d0e0ba9a50bca8ec35b930cc4afa6b47c85
SHA5121d8952d87629f43bd23fdc2f1f999238f97b2e89deb2e4b2cfd8507a9cf73b32e27fb0ba4906d12de7678a3fe0cf64d6f86392e565a84f113974df37912b3dda
-
Filesize
11KB
MD5775ac83be008a64c015a18f0544c622e
SHA1c7a2956cf84801121c4136cf0cf375589f469a43
SHA25692f5fdfdd366d75d16c5bf2c75380b926411c60df14109fd176c176039b54e94
SHA51240fcc697e6bafcbd05989a09654cb76894459a7367971e7572b27a24d1ecebcbeaa5d8c65e4bb4901df05e95dd06b78e815a3ccef9b810586f76fcc8068c9f71