Analysis
-
max time kernel
120s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 13:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1mHtC1mrhoQNs0xcgm2XuX7dtu9EPYac6
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/uc?export=download&id=1mHtC1mrhoQNs0xcgm2XuX7dtu9EPYac6
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3492 5068 msedge.exe 82 PID 5068 wrote to memory of 3492 5068 msedge.exe 82 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4808 5068 msedge.exe 83 PID 5068 wrote to memory of 4708 5068 msedge.exe 84 PID 5068 wrote to memory of 4708 5068 msedge.exe 84 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85 PID 5068 wrote to memory of 4984 5068 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/uc?export=download&id=1mHtC1mrhoQNs0xcgm2XuX7dtu9EPYac61⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff6e146f8,0x7ffff6e14708,0x7ffff6e147182⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1960 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3023277678212456289,1942210029221168478,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6044 /prefetch:22⤵PID:2320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
512B
MD5d219eedc131b16c0b9f6c7a5127cd691
SHA14866ff9d12c487f6d50557ec8771d3f2a021181f
SHA2565ec7a526a407dd6f01427e602ac944d7b21a928703507d2787bf69178dda6383
SHA512c5085f6fb38144a4a4abbef3876442d05acba4970e194641a3d3c5afa872ca08096187aea57fd22b8944216231b08b4628b21e14dd632d2ac3430e28ba374513
-
Filesize
6KB
MD55ab3b9dcce50b06e5e3bebf6fd0dc264
SHA1f8a7844656f7881afb0e2d7a8e59413af7e0c63d
SHA25628e0d690d3f1887c5e725c0ebc5b8ebb54ce4ce6a76b601e925bba3712fa9806
SHA512dea49c67dab888986eb0435af192f23a58333fe8b0d484e36d0dffcbd40114d089d3069b65cd069f873d7ad7a374d32cee651f71dd437888156308cf122f090c
-
Filesize
5KB
MD515ef681e1f3275809d15be9b70988b31
SHA1dde95536fff2ab5f589b4cd3af93156d661b70de
SHA256147f1cb9b94d6ce1fa9ffd99a51bece9c5c04730821110e12e810a0a4177247e
SHA512666569f4f574fbc9f2ae4b7ad6432e1406bd7f71c0e31106feb2e0f5f531431e9b83700824c603ea2ec64c8838d127e62f1469667271b697ad3559eba3fb7c90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53ffbce1b047c9fb716535a30fc879e4b
SHA1283c5391117f7fbcf6ea000085367b81d8e7d250
SHA256a4eb7732f94c9dc1a2caf51fea956858cf04ec33c1e6ca683023c26258992d86
SHA512380651be63671bac827d9b921dbc7503fe923b60b63ab70cf3910202ab33fbba8cf9cfe9f34683cd00ddf763b246bec8171454f84a6729786cde9ea2b841c901
-
Filesize
10KB
MD5d6791c9b9c0a6db5eb518e98463d638f
SHA13ce909f2269b919f61cee71e8456c4861f4e1e44
SHA256ed4556208c11cbfa5e0d78eeda970d8bde229c8dedc2c726fbb4be1713a42408
SHA51210766c705fbc6d58442fffd70636864478ad7a4f12f24dae6036b270180e745515d19ac195ffa8a4862e746b02f77120fa9db648e4356d5ca67db54675736fff
-
Filesize
10KB
MD55ac7d672fce89a2402782982344056f8
SHA116fece59315eb2b9a1c93461ffb4a43b89ecb8a3
SHA256f9cf9fe8e475ce18651f1d837913ec6037593880b791a0527f1b4e7bcc4c3081
SHA5128b076c95d67df04ce2ff14853dc99e83f18e613d9884df8257a0283dd5d2d772ed1eef16ed7ebea5a1a9db0c0ce8f48181800f1a87c2cc46d899f42d82c84c31