Analysis
-
max time kernel
19s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 00:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1oZwSkwqJKL-3du220wh5pVVUwz6wtqfZ/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1oZwSkwqJKL-3du220wh5pVVUwz6wtqfZ/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2136 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 1364 msedge.exe 1364 msedge.exe 3624 identity_helper.exe 3624 identity_helper.exe 656 msedge.exe 656 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4280 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious use of SetWindowsHookEx 43 IoCs
pid Process 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe 4280 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 4676 1364 msedge.exe 83 PID 1364 wrote to memory of 4676 1364 msedge.exe 83 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 2560 1364 msedge.exe 84 PID 1364 wrote to memory of 4284 1364 msedge.exe 85 PID 1364 wrote to memory of 4284 1364 msedge.exe 85 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86 PID 1364 wrote to memory of 4124 1364 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1oZwSkwqJKL-3du220wh5pVVUwz6wtqfZ/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8adf46f8,0x7ffc8adf4708,0x7ffc8adf47182⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5910667377083934102,3971993837646920796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4280 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\moony_v34000.rbxmx2⤵
- Opens file in notepad (likely ransom note)
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
5KB
MD58b9e67871e066313e3a9b9eb3b47efd3
SHA189d152c674054aa3ec1233583ca17ad18df3a20a
SHA2566b71b2ce03ca83af5d3dd382c4f976c950f1b4f69749ea8f9bdff0f70d8f94d6
SHA5120c9866e1d5c01939d287f4501b5223d5fd1996100f6a3f3fdbb447afc146c9ed0264f4cef08c9868275e497e55f2fbcf2dc0284a8ec5c54cf2f0cfc17bb8fb82
-
Filesize
6KB
MD55baf8c58c0f6ba7110efdd673041a9f0
SHA12feb7a6ef77d46e84e9143c4e41be0b7c7a68394
SHA256090626c2f69b1320ddfcfd81ae1c446b7ddc7b2c3bbacb6408dea48481858074
SHA512b4c6412c05847beeb2c12f7057f96fa459975d3bd87caa9b4e7b7948b81ce5e78d7988f82ba6e0642c0b9f70cd23eb7e771cbfa234d54c24c2e754f39f9f06c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a312339488eaf54fc093fc4abf3bd547
SHA1bf047324e5609cceb83f37de9865d9bb1eb267c6
SHA256cdd784b82e936576103098d1c898765811dd1f444b2fd11bfb197b579da771eb
SHA5128bb26f111e0b5b8eeb8a8ed508ec34e025a891b1490a50803976bfc7a3168affe4b4ba7d22a496f414b7e51d289e4140bf6725e46d4c9ee9d17d94adc000e1e0
-
Filesize
10.0MB
MD50e57517b7b71a4ea9383c52f69b946b3
SHA1a08536b1476670bfdeb483f90096f2ace55c6a27
SHA256e39d9449218d7f579bb2b64641e4a028e1b798337e27b5445c17c8eaea218eaf
SHA5120b0bc1d8e716b5d45cb9385b3b9a947c02d2deda87ee15324a8bcd0bbdcd8ad42ad0e17c9c8453c6e1225bab22513d1b77b1be97f45752e383d3cedd34031ef6