Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 19:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1rdmS1fDaHAYUg-ffOSwekYdrZ2w92icm/view?usp=sharing_eip&ts=67378da0&sh=Z-sGzwd7gGEGHgSf&ca=1
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1rdmS1fDaHAYUg-ffOSwekYdrZ2w92icm/view?usp=sharing_eip&ts=67378da0&sh=Z-sGzwd7gGEGHgSf&ca=1
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 544 msedge.exe 544 msedge.exe 4960 msedge.exe 4960 msedge.exe 2916 identity_helper.exe 2916 identity_helper.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 952 4960 msedge.exe 83 PID 4960 wrote to memory of 952 4960 msedge.exe 83 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 2632 4960 msedge.exe 84 PID 4960 wrote to memory of 544 4960 msedge.exe 85 PID 4960 wrote to memory of 544 4960 msedge.exe 85 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86 PID 4960 wrote to memory of 1968 4960 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1rdmS1fDaHAYUg-ffOSwekYdrZ2w92icm/view?usp=sharing_eip&ts=67378da0&sh=Z-sGzwd7gGEGHgSf&ca=11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5fd746f8,0x7ffd5fd74708,0x7ffd5fd747182⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4000 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,3781094670629577775,2922252814372003533,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD51eaa7fe88edb8d0cf86a6249c1a958c8
SHA13ea1fe6eb3a86164e31a7d685a19f0583235500c
SHA256c7d2b199e4c03405c6a19a5119f79019c0f3ef169f05cf204b9019e3e13822d3
SHA512cf7363df4cd23d863262de1da301eda19b5a0dfb15c208174c29d6b4ee385fdcbbbb755f788632d2f9b27163fe19bd314f1e4450a1876eceff892b96645fdfc8
-
Filesize
1KB
MD5cf73e4d122abfcc6d51746952edd4572
SHA16805e42959c01f9af16ffeffc2c0b8b378a4d49f
SHA25691538a461ee17cdd17cc10211cbeca3338a94302a4913774ebe3bfd40cfa6531
SHA512aef96b8de330273ea2f3d590d148537058f5a963fc887a5a60b8ae0318f5dee69b4fe99b79fde2b1b145e808c6caaeae446ba7fdf99ecc31b8f0e89243da2d91
-
Filesize
1KB
MD592225d1f155a5bd1367058bfe60560eb
SHA13291674427c9af4e3f16782afa7f8a520ba1fd94
SHA256a286b57eaff5a937960df9fe94280eccfa5712c8620735b9749aa691c71f901d
SHA5120e9a721db58531b402c968f3dd490f39155ed287eaf7868d68cc855660d239e8a4295002c07142bdc609aab5172bdad9459082d713b5c8e8eb3b223be607f67a
-
Filesize
6KB
MD5888b615babd240fee9b6075c03e957d6
SHA199d264a6a065fef87ab201254ecafc0b1dd54176
SHA2564f162a4737b5132b217b0d8436c766612635fbccda88c1a1aee6929821581b72
SHA512e46b296e87e9a2845d03b7bb959e28cbf8158defce25d3378bd1653ce05c0919d5135cb1681d679c2711e87572af14102937fd83f2e5edab86a3078f342c740d
-
Filesize
5KB
MD52755bfb1e9d50e1b39faa7d9bbb3241d
SHA12d06f29e7203e5f85654501aeec7660d0f3c6733
SHA256c064f6b4fd9cf1ec01b1f1097b5a2a1aefc0f383e19de928a7ac7782080595ed
SHA512d2a8f09fb2a1cc584640ae067c007f541e0ba1c18b7bcc1745234bfdd9767fee3d3704e21305276365a99e7b75917a4fef5cb531696f489413f5c166690948e1
-
Filesize
203B
MD5e4c66ef0512d79740cc14183cf39f95b
SHA103bc6c829d7d677c973d0e30085e1fdf8468135d
SHA2567b49e91679aabfeb0d7fb88ed139989f4c474a1a823230c50120849325c9a885
SHA512a33b3189317511e319f81e207084ed5d504aa4381a4a7dc1709a6385bd85e9852ca19b01d1d8cc09544c185074792469251569011a720a5d6b7802e0c28ae827
-
Filesize
201B
MD56f04aa2f26544284bfa7565933edf6dc
SHA1130f5b63e22bb929976b275a261ab1f8050f242b
SHA256f643fc161c032e47feb6051aee18c9ab51d04c0763d31e8e9239ad5bd9032345
SHA512776b050190d2437e82588c94bf219d3ab488f79d1a25cd8f328211b6ca6c0cdfe6a33ca728c1d5a40af41dbfceaf20668c9e0a05f9e3b10f2225b5b36cafa030
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53dbaf5e959b8acc3efad38ca3387cc18
SHA1140690d190a0ea25b069b6848b71e21caa491cf5
SHA2566f9f17a680f18e9550ac9bcfd4e13957c21e15452f3e5307d58b4d0d498f1016
SHA5129c8ec1760796f98aaa71f8db4425a0815c08620af3d8946711474f323940b30fffee038afa4f21880b0cc671b8435ea15529753d6f3457b1a5245d621b6c530d