Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 16:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1mnVu5OTC0yB0MHhl765mvWowR-qm2hy-/view?usp=drive_web
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1mnVu5OTC0yB0MHhl765mvWowR-qm2hy-/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 1216 msedge.exe 1216 msedge.exe 4936 identity_helper.exe 4936 identity_helper.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 4352 1216 msedge.exe 84 PID 1216 wrote to memory of 4352 1216 msedge.exe 84 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 2880 1216 msedge.exe 85 PID 1216 wrote to memory of 4424 1216 msedge.exe 86 PID 1216 wrote to memory of 4424 1216 msedge.exe 86 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87 PID 1216 wrote to memory of 2116 1216 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1mnVu5OTC0yB0MHhl765mvWowR-qm2hy-/view?usp=drive_web1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4bdc46f8,0x7ffa4bdc4708,0x7ffa4bdc47182⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6751881860842613344,15649021290035309718,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize648B
MD5c945c8dc0487feb08d57f3900122074d
SHA19f471952b9bf9473b99d64537a99770177722735
SHA2561932b3b234827c605bf66b4be036d67524b00c5f0f118215b642d1268c817e85
SHA51283d8b6086218e68b8f360bc2e0d4f0137f126aaebf3fc7962740a34a4e5f5bf44d8fb12732dbf0b3212620a0c3a3e1d1e98ce3a1c3b48cf7af2e0736e6e8bc39
-
Filesize
3KB
MD5ff925ca2cade53722845e1515b57960d
SHA136294a306ca096c3cad689e3794d5978839a623a
SHA25630fd3ffd90b9803ddfc2463174f923b0e28b34f4a34673fe12e5c83fb85ea109
SHA51222a57c95fcc10280afbeaec1428e99fcb12a24af8654cde0744be76128c3f7146ffcc48a5d8328a10356750e9fa11ea730c06655984b3de87b2331948d78316d
-
Filesize
3KB
MD535df683ae2f8f4c7d00f917599adf716
SHA13839fcc2b0e1bed002a384b55f70cf8281cb068b
SHA25607228b504e80693db6c549b421d80a816a42726c52c9abe182133c0d3fe88206
SHA51265d504c28614bb244c9c60d7788dae7d583db285487758921d1ab5430620637a80f7bc27677021b99b58e3c9f8ce2b6e53997d612a99ba39d1aab97216b0c6c3
-
Filesize
6KB
MD55b9eb5c5c358f55ed793a1e43f20e225
SHA1496a8cac0e605bb0137dfe7a553ec554e9e3b438
SHA256c744e8550a22a06618e79f88961c4aef41924114c41e6e3ebe2a2ca713cb69a9
SHA5125dfbaa3d11f1a0e46f56bef875d7fc759b0bf6a28b944e0c310b828e6b0f56c6a0b27b51e27155c46e72e902c7b69ca846cebf8cee2d877647ba7fd35b1d6790
-
Filesize
5KB
MD58350177e18f053527dae63935561627c
SHA1f1cc9315a4576c993f84c13b8342cfcf01fdd114
SHA2567a11bff0b3a540e67211e227da65c9e538eb5ca2670d2d5be59bc03e62bd58a4
SHA51248a6d266f5085efbb77c44226c8edcee7f7565a7697a9b3affe144edfe4a342d30a8caad4adcbe96b90416d26665aeef1899f31b777865335a70de90b7182ece
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\0f4c87f58e3554965c14e5072f508889705a6c84\index.txt
Filesize97B
MD5bffae52fcf89c4bbbfaed2d25ae43891
SHA1b7c504e7fe5cece6e4232b2f796e068423a17478
SHA256608031f05c912c47627dd9a6ab91db9ce42d824f300c5db9e05627b747b5e706
SHA512104fa3151d2526e9825e69ed0aa7de71040adf9fbe30cb999a634f85dc26dfd22b38ecb6117f165808a5751e6c1faff7cf4a0371379c7a1e13608522c26a658d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\0f4c87f58e3554965c14e5072f508889705a6c84\index.txt
Filesize33B
MD5b0195b619cd45d0f8af48fc59c3d7716
SHA1d153ae8be73da841309a68f26d26642d05ac20cc
SHA25637bb3e6cd75d830156a6934fa1d1516121b37b4a220705fe32adece7b7ed927e
SHA5126d917a97131baa380386bcf2c83dffb97f832e85f9510db3df4f7cdcc35396da58e5e098fbcf3fa7867b7909c09158d091ac0432919ca685ca5c7966b88a23c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d6b30fcf6547dec493556883c4c67772
SHA140aff4a835efc8993e4bbc14e18272a4448a8414
SHA256fab50e3c61c0086b41460d2c3563036bc261685cfa39a977cd03bc37346eb35b
SHA512198fc3dd131183039fcf181591da92cb26bbfe860c0cedf8d558416abe21edd349538d70e8524f67a97cb2dbecedd4de5e921f1ab65fe19ef07f0925a5022f01