Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:32
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule behavioral1/files/0x004a000000023291-28.dat pdf_with_link_action -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3280 msedge.exe 3280 msedge.exe 3808 msedge.exe 3808 msedge.exe 4200 msedge.exe 4200 msedge.exe 4784 identity_helper.exe 4784 identity_helper.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe 6112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe 3808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3808 wrote to memory of 4208 3808 msedge.exe 84 PID 3808 wrote to memory of 4208 3808 msedge.exe 84 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 4292 3808 msedge.exe 85 PID 3808 wrote to memory of 3280 3808 msedge.exe 86 PID 3808 wrote to memory of 3280 3808 msedge.exe 86 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87 PID 3808 wrote to memory of 3660 3808 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/uc?export=viewonlinedocu=d&id=1E9BvUjN5zwHgMj9nceRXIPZGkoA8R8uF1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb91b646f8,0x7ffb91b64708,0x7ffb91b647182⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3040 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16184754925604809983,11921978274281383056,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
512B
MD5a2f73fcca7df7a72c2c534b88daaf2c9
SHA10ba50d50cdba319381161a2dcd20089ded154e28
SHA256b12eeb7a64c48a9c24bc7095798cd4af792c00d4dc5568c7b43e5d1f50128ac6
SHA51273fcff5ef190b2203cb78808e177abe7d907127374b158d99ca5bb5bfe2a5bb7584221b3c14538f2f94764ec6e785fd7f4cc92d272d60cc32f6b92469b53aa00
-
Filesize
5KB
MD50ac78bf862d1b68edf2f4820c2c04cfe
SHA1fb906fcad3ca7afbed8acf6dd20090bef2a4ba4e
SHA2565db11a5cd6323895f53898fc583771cc2026dff91ad0a7b3c8367b1a1b392070
SHA5122c8ef5c91b6e79ceae6d30a2128b806508b2d2e2e59e8e6037d15f0e64fb5b3107fbb97f4450af03b25a8c25dac7a30c2ff4b7bcd40d4cb6a9e6d5504a63739b
-
Filesize
6KB
MD5e6365be63dc78214f6f901e22dab8b81
SHA13b794981e804a7851e2293db18641073e7768c55
SHA2565993b809848c7418a500abeb68348d2146f6f34b0d0ccd597fa4d604469bdcc0
SHA512096942422abea2892660d351fd451c281e0df2edaba05c578d46357774d0ee5f73cd6b1fa548b0568d4b9460220dc45eb26e80c5fdd2203191710874bf2ca5d5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5660be6be0257befd9e5405213e25d0ec
SHA15086303d3fa71df97a1d7a20f539ec0c074d4d7e
SHA2561b7a318480e45804aaa2ffc31b242a0e213c7cb85c1f68b70803f98490e63196
SHA512339f037e6acb11b14bd77bd476b05583ba4a9229876ac43cb474f472fb127dd9abc989d8e18de511996e01c5a05beb54ff5ec767cb2fb851527c67ae31feec83
-
Filesize
34KB
MD59f133d3e18cc4e5f682be91fd89b67ef
SHA137b59cf83404c7860c120d7a30bb9241f89c4715
SHA2562852542883f426ffd73efa22209baaf72d2d04c1eaea054d1906da81205d6b7d
SHA512dfa1edc5f3aae52cdf21ab487282ed6af6ae870b99610c36041caf0a862ac7a50caee64d643445f31c55a975b534da79d41951879415b203bd581948d65d05ed