Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 01:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1PVy0MS0ZsX-FGbVuzzfr3EMJZMg-jo7-/view
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1PVy0MS0ZsX-FGbVuzzfr3EMJZMg-jo7-/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 drive.google.com 16 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 2652 msedge.exe 2652 msedge.exe 1932 identity_helper.exe 1932 identity_helper.exe 5860 msedge.exe 5860 msedge.exe 5860 msedge.exe 5860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3576 2652 msedge.exe 84 PID 2652 wrote to memory of 3576 2652 msedge.exe 84 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 4976 2652 msedge.exe 85 PID 2652 wrote to memory of 3712 2652 msedge.exe 86 PID 2652 wrote to memory of 3712 2652 msedge.exe 86 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87 PID 2652 wrote to memory of 1184 2652 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1PVy0MS0ZsX-FGbVuzzfr3EMJZMg-jo7-/view1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa6a746f8,0x7fffa6a74708,0x7fffa6a747182⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3447235961888501576,12751179311391601340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2356 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD50a2c8b39fb928eadb5a1d1157c481251
SHA143b288ff1b0dddc335d61f5020130ffe50f7d839
SHA2569a84fe45c6d36581cc0d69da4b27953a9c1c6cbf2ab7362af659d6f05185f26f
SHA512422faad880262ddd88150e5c65deeb805548ae62c4ed4f07ac94883082ef06f9b42370dde302d0f89c87d29b4b4bcf2aaa719f5364765b2d2e77dd89336d766c
-
Filesize
3KB
MD50d621e2b94d3a1ff191379ee82c692de
SHA115377663a9d840b3de8507e5937a8387eb309010
SHA256841c6d3537cc01d4d4a28c4ac1404c52fb44c35e6d7d06abee3d04be4392a1f3
SHA512463920eae965850fb06dcd62e73170c6d88ba58a0f4dc09808f5e9350819f398eb7957d78516f904d84d9023392de9f4bd74135e5d6bd7310bfa36f9e0549dac
-
Filesize
6KB
MD545d57078f26169ae2408d46e82d835b3
SHA16e58548ef0c71d757ef0fce61692840d9b693db7
SHA25608b599f01b8c995a8aa6429a187638bed5ec3fbd8771716d15349a982e261787
SHA512889e42da503773a20c9935d6c63fe043b98130d1051e2c017db307b27c36e35beec73685ccdc412eb3672175da0eccd511fa0b1228fa34fc9460b2225949327e
-
Filesize
5KB
MD595e3ff4fc389fecdfad606feee76db2a
SHA151c20adf2ef5047545fd7b6a12a447166a7f435e
SHA25624bbe92e0e5f4a90ac77847238c5e830d7d6016656557ba6c7a453e996e9b933
SHA512c1af4a35730f7e8b65fa84cc3fc354c72581ce72072ca085a76bb4c5e79739da970a992be3d1ebde31430cd1ce7aab605bd620d8b352c64dbc3d700b029b8289
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e3f24caa-b472-4ac7-b3c9-6e574f5f8fe3.tmp
Filesize3KB
MD5d1c945d8eac9e59beffadf0f2974a8f6
SHA1da7d0ecf82a78ade0b99e1df5979d4825131fc9a
SHA2560e87a8801f4a096d8973f2d507e4fce2c7f3424f4bc818c5e1bb31fe7e736a16
SHA512693bcafa2df918534caae3a9e75992c7a3456fd41f1a9415e72e4cf852d199a49a88210c1b0d89dc6d45a4dc76cbe7250e536d71e007ccd6dfe7c2a0adcd8333
-
Filesize
10KB
MD5fbb8a706b44bcc8c3e15e0bfd6a0ad64
SHA1ed43a3cea3bb238942c936ac1c83bc90d442fdb7
SHA256657fd210fe5bb1aaa9c82a60f7d1566aea5d810e33cc7b4e23f61f241c965b7a
SHA512c6874afc1059ebe033326a428ed0bbd2dd8002f2d401f0a5d33d660d028b79ef306b13bca33d2d32db00e4e36e471b0f725c4c17cf488ec177f709ee488e2157