Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 11:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1DfI50u-Th2p8tX5HLbGuCBQgj7LFUfIx
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1DfI50u-Th2p8tX5HLbGuCBQgj7LFUfIx
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3620 msedge.exe 3620 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe 3252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 4596 3620 msedge.exe 83 PID 3620 wrote to memory of 4596 3620 msedge.exe 83 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 2108 3620 msedge.exe 84 PID 3620 wrote to memory of 3352 3620 msedge.exe 85 PID 3620 wrote to memory of 3352 3620 msedge.exe 85 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86 PID 3620 wrote to memory of 4528 3620 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1DfI50u-Th2p8tX5HLbGuCBQgj7LFUfIx1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff84a846f8,0x7fff84a84708,0x7fff84a847182⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,3017350838540826268,15042881432786730559,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
32KB
MD51f76396a01f9b997d149642fa19395bd
SHA1f26dd69ff0c45d7fcd9553f0cc5caeaf5410cffe
SHA256c519c5d085e60c32c52df7706f00daddd219415a5aa2c45d2d7d9dad1e5ac849
SHA5120153e322815e320bbb18042488bffc0bd7a7c6c063c9919284086496c58865e4da89b3606c0f58e1b7c0a07380dddb2e2a59f967966868c21c26670c215064c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5bce3f00115cb845ec7faa654def6c0ba
SHA15d76f80b2ed4ab2cafba3f19faf4b267ad0972ec
SHA256c94d4bcfb17b5a3dd346085b21bc337f88a9f3e39496be70c64629530cb1fe75
SHA5121d48617fba8872b5fd795f6007a0b55d68bf204ea295ebe1920c2f695288e958f1208c19cebeb0150435037c93bda7a33a426c5922be35abc2db7950a6b127a3
-
Filesize
4KB
MD59384d227e867fc8487b7da12c86826f6
SHA1f84dfbfa64ec8d8f87eb2847ddecbde40cd59e3e
SHA256ec6a4f0b2fcd02894b8455e2732ef08285c624b377b3917441173fb174a49e50
SHA512d9fde29b13a33142e11c5ebf8c9f968e91ecacf1cf04956e7ac7fd3e06d57a4873953144c8706f39460c72ad3becdfae09fde5bb020ce873ead70e1c84c16762
-
Filesize
4KB
MD566df4476b9f50a990ece0dab89da45e1
SHA14f37b554974d3122ae19ebec9ec54455a1938237
SHA25671e2d10289a07d95fe6c0ff7f51bd8937d50adc0b9b722ca72e30f680876de77
SHA512bfb7d188c2a00f22d52e562bf91bf2e4c252846dff8b36e6ddaf9e397b280cfca6915a36bc75838fb28cfe4b3a2cf7056a9b5bc77a39310586371b448c150e89
-
Filesize
5KB
MD5ee86b12363ce4549a1a6628a24d59adb
SHA19b5b10bf21d6a10257e56176d34707d85ec1f612
SHA2566d4a6a31ded8d62bb20f780b1e476e78c9f599a4e02c094c5dcde0c00323bf16
SHA5128d31db1b39715971a41c07cd3cabaf3d2dc44b15f6b719ae7761ec39fc7d74238ee3d046397015cf485d497cbf9cec6176495c0509fa7c461e72d046358306f3
-
Filesize
6KB
MD50521627c13e91d07b7d352ff9db37624
SHA1150f8084cce972aec7fa6efc28869f1f6c390fff
SHA2562a2a64d95896cd2ced9aab7528e06f191e9be13974f745b460720239f44cac01
SHA51289bd311cd91ec6c5254fe882dea92ef744b28ea47a8eaafb7d2da9196109b87844aa103a9010d0c582f41a3070e67bf61d51f9fa89b9c3f9532578e7eedfbe2a
-
Filesize
1KB
MD58da4378ce5af5dc9e4c533d1f4382341
SHA161626a51fdc1300708e5c0b1894da13c8381fa8a
SHA25628e02615b4ed1bcc2b83a356b0d9992bcc139f5aa6b1ef07f39e6d718726cd4c
SHA51208f4eabe903a47dfe25171af48d7771659344a8c3d56a78c9dc0b872c0dabe931b1c2af757142962641edf8b7718232d27cbca978d92bc09665d61c1ee8fa572
-
Filesize
1KB
MD5a76d97cf28ac94a9816f9898b8f7593d
SHA1ac2fd0f4feb514d6b44fe3fa8b665569d5f1e242
SHA25676717c616eff5af47cb18b9b577882ef9122ed9b3d79a8dcf8e7339727e13f85
SHA512367bdb942a4db703dd94b1cc4558edf64613722cf3c1a6e6c10495430b4cf6bf386cb0719528fe071312ac072c77644935cb683eb0d57eb25aed985db9cbecd2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5abc0036db41f32e5fc0296a58aa71b41
SHA13d4314b7e1e3e55a52eadc5d32aa23e2ba829d75
SHA256bedd50c444ed1c9da6d29168a58589b943775c849574f18c667d6ede95c6c22e
SHA51261bdce06279f83129eb87d941beaf7bd530e361779b39a8773f6dc6a034f04d76893e1e2f2b47ddc389b5c36ebf567fe20b862e7d8bd4c5c013be135e1344e83