Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 03:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/open?id=1Z6Nwi2U_DQcT3c45jz0sLN0xomA62A8_
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/open?id=1Z6Nwi2U_DQcT3c45jz0sLN0xomA62A8_
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 980 msedge.exe 980 msedge.exe 4600 identity_helper.exe 4600 identity_helper.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe 980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 980 wrote to memory of 384 980 msedge.exe 83 PID 980 wrote to memory of 384 980 msedge.exe 83 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 2128 980 msedge.exe 84 PID 980 wrote to memory of 4372 980 msedge.exe 85 PID 980 wrote to memory of 4372 980 msedge.exe 85 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86 PID 980 wrote to memory of 2972 980 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/open?id=1Z6Nwi2U_DQcT3c45jz0sLN0xomA62A8_1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ffd3e7f46f8,0x7ffd3e7f4708,0x7ffd3e7f47182⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7344466572217792893,13346437615700182400,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5d278cd0760b8dda829a9b13a47477141
SHA1ad1f6ca49cedbd50ba87cd867351d14694473859
SHA256fec5890c90ba57e241cac7a212758e2ca2593bc17bcc01966ca08fb7ecacc5ec
SHA512b486a98aa2e11940ebda4cce14225baa44ed31d95539d8086db0c51a17cba816a90ec03f677436dd053a8c09653b5c91f63148b574ee34b2eca16919829ff290
-
Filesize
3KB
MD57cc7c661972db593fdfe9f0d78db386f
SHA1177ffdcc7215463216e0817cc5baf85904d8a86f
SHA2567ee957cba25338f8b1d91a9adbd019ba6580ba0a11e5763a1527c2f191c41714
SHA512dc4ab4c2e0b1905ddbb55f7d732fa96268f9b89daf81fa4168c8509ddfbd603cb138ff43574839a68fdabb665d66e282cd10f4728d77477c4e39d2076ccf43f2
-
Filesize
3KB
MD5d7122b88696887e523c547676f673c0b
SHA1ea97d43cf30b8af350345cb43d382997b8b77e79
SHA256ea85fd697a29360e8fe4b5cb907ebe63f45f3b3db03e27df271b8bbe3e4f0da5
SHA512f32ce9dbb6e9508ebd8d4142fc809cc9f6e23433df102f102ff725642bb6974b179510e579ec1dcd7d305e200394ebe9d505681a57a701c37b18abf4295fc059
-
Filesize
5KB
MD5ed0a4e13d0d37b2797e3d45d56a8ab4f
SHA1cde47fe4e9dca21dc5dc542367df9cecb8e7370d
SHA256047a68877f026efca71fde01722e8992d0253182599a8a93d9957d0731b16810
SHA512d1faa366550a4e5fa73f916440cff16eedb38efb49739d8d83a1ba8d3803578722f5ca179b27ebcb92057dcb7ff245d4c041a3db110e255fb9d74aceed69fe35
-
Filesize
6KB
MD51b7f081f8ac6445c2a1f5a7483bdc8e7
SHA1341ff6890ec351d3c5569010c493b805b8a1fcdc
SHA256e452064b8b1f25a747764be6807a2619890b38d6a30e306d4c88845cab06cbb7
SHA512e3cb0dfe1144c27e18cbb471260ad745ed548cb507586c713fef599d071b6ce4bbc809c09a2db7ccccebc4cdb827f2c702669737f2ecd6f641552c6294fe706d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51834dd292e2db6dd194c6b0a9369b6bf
SHA1407fa95969f98368a7f1ec5afe4a186404f8c41b
SHA25622bafaffe858133cdda592d7b3a0b0b998d2a7317b732a747c8188d93ddec9f8
SHA512063d46ae6b92c361b3be34174a557ec1a1717cce5fce069993101650393db1feec7695897f3769041883f32568f386f608716b14f583feffd12358243a46f9e0