Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 11:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/18jcrWr_LZCSpq-d7Uuu9gO8aDofD_IFg/view
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/18jcrWr_LZCSpq-d7Uuu9gO8aDofD_IFg/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3016 msedge.exe 3016 msedge.exe 2916 identity_helper.exe 2916 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3292 3016 msedge.exe 83 PID 3016 wrote to memory of 3292 3016 msedge.exe 83 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 1076 3016 msedge.exe 84 PID 3016 wrote to memory of 3672 3016 msedge.exe 85 PID 3016 wrote to memory of 3672 3016 msedge.exe 85 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86 PID 3016 wrote to memory of 2180 3016 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/18jcrWr_LZCSpq-d7Uuu9gO8aDofD_IFg/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabb3246f8,0x7ffabb324708,0x7ffabb3247182⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5175631123022791697,6631681930964090989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:5080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD503f745532bfb35c7c0479f8b510f465d
SHA1c25c81bc839f5ac49378e7fcc32fb6cbfaea34d1
SHA2563140c7a1d7822ee5052c81ae0e48d3b1c1458d2a3d2d68e22523cdd8f89a7a9b
SHA5123c83b0642f0efaa6d98bdcb8a2b5c082f3460188eb2f8d48e2044eda5d7161fe2f218fc2cd2aef36c216b88d06aa8d0b7030d15408d487de271b50d4a930e5d4
-
Filesize
5KB
MD5110e6e60f1b57ed814f6cdb0072c717c
SHA1ab2907c48cb3179a2ed2b2d20b43fee4d4c89fe9
SHA256c26de52c21d4841b34bc9d546e3e5007f9ce6d0b8034d7714f91b0552a294539
SHA512e1411d7c4abce7829c90087586e8113fe0d0d4e16cd22c6889d413558dbdb88bf0a495467b87d5fb5995a68c9ebdac5be89e35c3469a4e5e3c724f58c8b489a2
-
Filesize
6KB
MD523ce07c0c77e9775b5c8eccc29e7783f
SHA1ed3b2a9c911491f03b1f3816a4e84894bf6311b6
SHA256123b16cd5e10ad71d0cc79ab56604f8aed3127c83979d3d2b34bdd7647f958e7
SHA512292ee2e4269c2b0cabb2618cc8e4d6b10a0795b2258111980d5318151af82d97df80c3ce51c42ab71aa2041253f201fda9a426b19d9f0a60cdc6d1d4b6c50a1e
-
Filesize
6KB
MD54188efbaf717800768b1709803dff16c
SHA195e762a8bd11261b8851133d9eb17e5d5b2e4f52
SHA2569fa0ef8837e4027977f31982f8527170bd6cb711c3ec52b2971847a5a00c4b97
SHA51251f62c146097edfa2893ad1df4a54210ecdff2a8f16c30f62bd50c079b524f2ee7ced933d13999a115794f15fc046955334824486851c3cb1c5be16cb71668b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD517940594d5381606f6c70f0e82fa057c
SHA1b3b32e5a50ab9365c69a8ab7aa5e9cc686a158a5
SHA2562f3cd74a1fcec831862b5adb95ee1f00e308a67f7d6bfb0f47dfc530bbeb6e4b
SHA5129f673ce18d1c5736dd55f1df1edd8ef837f4ea559e5b81d424a81d3f45aa183f1c3c11a5eae44310b8227c5d6db4e3d476cb49f56c4694fdbae0169cdde7ca8b