Analysis
-
max time kernel
538s -
max time network
541s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-es -
resource tags
arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
12-12-2024 00:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1LXz70ndNgn8iBEhdnMLqJEs5pRSOQLr0/preview
Resource
win10v2004-20241007-es
General
-
Target
https://drive.google.com/file/d/1LXz70ndNgn8iBEhdnMLqJEs5pRSOQLr0/preview
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 11 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 2904 msedge.exe 2904 msedge.exe 1828 identity_helper.exe 1828 identity_helper.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1168 2904 msedge.exe 83 PID 2904 wrote to memory of 1168 2904 msedge.exe 83 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 4576 2904 msedge.exe 84 PID 2904 wrote to memory of 1052 2904 msedge.exe 85 PID 2904 wrote to memory of 1052 2904 msedge.exe 85 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86 PID 2904 wrote to memory of 2840 2904 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1LXz70ndNgn8iBEhdnMLqJEs5pRSOQLr0/preview1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe0ed346f8,0x7ffe0ed34708,0x7ffe0ed347182⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2662535376008202842,5724401564905950591,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5fa42ad4af7bf47f42465488f68a12c19
SHA16a8e8bae874c0bbb8f1309d8acb7a6ba43b11739
SHA256fdf49f800ba0bfd9cd533f784e7d3a9f70ccd923a5258436baab9566b256ac49
SHA51266e9307553aa72b2ad1752c80287846c79a67efda83745cb6f471f73144252bb192954341da2d5cc5582fa8923a268616d4a888bc9944f19d0de38a3f9fa2384
-
Filesize
2KB
MD501fc9f5ddd4ca6fafea0200afde09a4d
SHA1647b5c3cfe13a6db1ba59d5cb7eb163feb3780b2
SHA25602b90c25cab3f1ea467f1cdb2274426f5ba4e5b5c9b643341f5151a9e7efb863
SHA51202794e1d6a9210a39e37771e03def7b04e08421232fd66fd46054b1036ec79aa378b9efa63b55837a60371169bab2516340637f2f5543cb266ac37f009028100
-
Filesize
2KB
MD58d7617855d45626bedf2805d07adc5e0
SHA112a52047f24deaf920408147ef9768a40771ecaf
SHA2560750c406f675fb05f75edec02d7c143f56472e2d7d962de6375c195ecb6bb4eb
SHA512ca49be8e05956e9196b19e7010ea1c670a9645bd002eff797c46e1c1c580fc39b7f15f53228597c70361838a7b9f3cd52fcbd63e124b65108b28a06f343f0f89
-
Filesize
6KB
MD55aabeec44da0145ef4157cc235291e8d
SHA1890dbed4b78a313660b91f0ef911fecb6ea54e2c
SHA256f3321d63144eee7ecdf707f303f3cb795389f2bedfb80b401bd3be69c3fc4b80
SHA5126a864323f68b302ca89540e09334b6b8877039f7a836f541d553555ceb2ffdec156700f82a62db193215e9a1f4f22c141d1eaca35dcb2f969729f7e6bf96dad5
-
Filesize
5KB
MD501a82c039204212acb3541d8d285c4ca
SHA1875749bed2d32f529b6f090fa8dd54224f0ee7a1
SHA25641a666f0e9647ceab351d61353b9e5b9222d78ac6ffd8111deacceca75dc62ea
SHA512cc1be8d80417a6baf79851d75afa93020b51f5b853ee4f3db973bdc3f5fc19d63018ea134c67fa85bd6d13bc5c7aa728d71177e1ae866df3efc3af485a93a243
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5df7f8bf7e4846e8d3e2839b0e5642e0a
SHA1a9961c624191d91581dcc19948abe1cd4a2d87bc
SHA2561b985d65a6c3cf875b59d1d6e8ec3b1a105ac93a6ea94ed04d65968ddecdcdff
SHA512d8e20e2702ce62e5c7e467b10b25566167feb580348fc6024da9652d130d50a7c88f772dc54066eca7fb9aa633bed69874235f10001f88588ad0b04cab59d61b