Analysis
-
max time kernel
35s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 09:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1vZzubDypvLaj3aBfdiXgltxGaMXlo6nl/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1vZzubDypvLaj3aBfdiXgltxGaMXlo6nl/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 996 msedge.exe 996 msedge.exe 4284 msedge.exe 4284 msedge.exe 116 identity_helper.exe 116 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 2684 4284 msedge.exe 85 PID 4284 wrote to memory of 2684 4284 msedge.exe 85 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 4700 4284 msedge.exe 86 PID 4284 wrote to memory of 996 4284 msedge.exe 87 PID 4284 wrote to memory of 996 4284 msedge.exe 87 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88 PID 4284 wrote to memory of 2256 4284 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1vZzubDypvLaj3aBfdiXgltxGaMXlo6nl/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb03046f8,0x7ffbb0304708,0x7ffbb03047182⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,11605318772816645287,10538023753439943788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5df03e8063fd72bfcb46be2dfea598b7f
SHA19cfb38ec9e327dc48dacadb2a2d248ec5762b7eb
SHA25646d344b9b2b4e2bbcfde1f35b432a3e662817d053ef4c8799134c56e36da3575
SHA5123dc68008b35f73169049be526b31162ae9104e14d37b242ad6e478cc1f2b65cb315a5d636eacf84b2ad18e87538e728e16e14d0695ac50b8b764cc5eec94227e
-
Filesize
5KB
MD5243626102193f7e2d3daed130e3eb244
SHA12472140ed64d95077e7a3beeb1f591ca2e7a410a
SHA256e106a107fdf5a59bffb4268a040947b7dd12af47ffcfe13980df22b7af3d81f0
SHA512796f96f4f6bbc70749acbf0370033be5cfd4a27555d95107118a6cffad454535d40ec3383550e01f3b16d59a4fba78fbc50ab793e85faffd6e5d25cd454983a7
-
Filesize
6KB
MD558e751fe9c39c95fd527595a4415ad97
SHA1fbd4c4ed4f50d26df1efbefd92f699012d71a7df
SHA256c735f6a28f5885a03ffe17ad1294ab406e6fe982f02735f035093bbee173d5eb
SHA51299d100ac51e32baf7d4c511f9eacf888153a82c2c0e1e3099e791bff8d29439f1c557b1bad05832cf3e1a376ff4ced3cb2dc41ec55b9b8de900f76499dd55ece
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51ab99e66b800a1e6969291ffac127d86
SHA16faeee4929cd8c01739aa6e09d20e18470fe0a64
SHA2566dec81ed9dcbfc6c50111ac03d5f47e120ef9cf44a587e2a0d65ca079b9a139d
SHA512ec2bc48d254eebe1104951af3a755649dc70387b62a681e49fccde6aea7209d3a911c5755bd11b12866268d218c2e0e6043fc241649caf6d865313b481b18087