Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 17:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/open?id=1KDkcVZyLcbkVEhBTgxC4_SWdcOwWGHc_
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/open?id=1KDkcVZyLcbkVEhBTgxC4_SWdcOwWGHc_
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 drive.google.com 10 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 2480 msedge.exe 2480 msedge.exe 2276 identity_helper.exe 2276 identity_helper.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2676 2480 msedge.exe 83 PID 2480 wrote to memory of 2676 2480 msedge.exe 83 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 5004 2480 msedge.exe 84 PID 2480 wrote to memory of 3744 2480 msedge.exe 85 PID 2480 wrote to memory of 3744 2480 msedge.exe 85 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86 PID 2480 wrote to memory of 2648 2480 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/open?id=1KDkcVZyLcbkVEhBTgxC4_SWdcOwWGHc_1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffaacd046f8,0x7ffaacd04708,0x7ffaacd047182⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,10490874857575798999,16461548189390000345,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD56ee44c693b1ee5691f1c2cac21cb5ddb
SHA1c828bac79ceba7042216d760a1a72d4e19a049db
SHA2562cd6b42b98b86307fc9fdde1391a21965643e14055f98b8b62af93544b0266a1
SHA51267bd9755f9851fbb23cd28bbcaa39820ac73eaef8c806760343c5b7a286af95f26f23c4cd45619a4c0ff7e3ade517a53037c826fc50c46edd126cfd1bf252be4
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD56f52e369018c37d2bbd9ad8acab687d1
SHA170623ed0ebb9ab94276389f99a76c50fd69dec98
SHA2567b23b2ac315536c07db4a3a283ffb3ba83c98f395c5facea214676dfb035d43d
SHA5129b2d1e6a4fd1663fc4bd50c8bd9028d71e6f0ee939ebaca2984162d4015383b1c7703743007963d50b5825e5bd4cc1266d31f24e7ed1c91ee8fc262364afa434
-
Filesize
3KB
MD57ac71a415a447bd319f1d5ae14b52545
SHA128fe788c850717cc81a5c6206a833539215cefce
SHA256fa2053d9b053d480411647a58fafaaa1686bf8165d64a376a707b26e9d24922e
SHA5125b89677724103a461b134f7675b9c5786b5a15ea16d42dcbd3c6a6e130e623fc0e83371bbe9283610ba759a216ca9f319afc7fedb45e8499fec156d3d85271e6
-
Filesize
3KB
MD5f0e575607481e799a9d70d1f4a2e1978
SHA180735e14529706e96bf972ceda2d82debce1e80d
SHA256d18fb950d66cf97c8e5498c8c624d953fa2d08de29b733ed2667dcc09785bfb8
SHA51207e8bb45e5ea61e76d980097e8b778e1133c59675a5f87c9ebd593ce755334be47f38a0f7892fc71c0ab6f4c3485c38dd1592a1a8882914eb9b693a375e55eea
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5c611dbd10e08e8c01d1c28202d77fc9a
SHA1652fb14503736918286cdabd3b66612ace5c9580
SHA2562c94cf9b7d1eeb9bcf40d0a795d64e47111a2ad45177d71548d029e1bb4a37a8
SHA512bcd5d761651187faca1b6307d56fabcefa73433513a2c339a56e48d3d36c70a1f7424844374f3a122d5cfae02c5d62bf53a635427974f47cb2a8add5bf1df7f7
-
Filesize
6KB
MD52e409f3229a7cbee4c0f1561e4daaff7
SHA12a39b720c90cbba7d24b284b8bd6c6953450b4c0
SHA25608d71631f19d2edb120aba037f22a5b22829291f6bdb9e8c453225f46190b608
SHA512cba45a747e860a70dfa11a2b31762229766bfd90c1336b9c9fe02e18b5c5cf154cc8a44e3e7678e2c07c716a6fb95c504c3619d5496152b3ff11ef8404547beb
-
Filesize
6KB
MD507fd535793ae612f3f2303ac61012cd1
SHA1b79c8fbe0c46e9da44b332df8891dcc4579fa93e
SHA25665c195fdf5db0417f8cac02523efc22234aaed57344277e854799629def1bcce
SHA5127e0dcaa9b8dbb49cbc93b86c6636d3a4dd8ebc4cffb14f2d5527d6e2fcb076cb181e7b609ec550b374bea0bdbcf243bb13380d05fd94a7a316151ae04fa4ac32
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389