Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 06:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/open?id=1KPdgtLig-DheEHUp6tkZCwflu39KxgrZLMF-2s4H8Ec
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/open?id=1KPdgtLig-DheEHUp6tkZCwflu39KxgrZLMF-2s4H8Ec
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 5088 msedge.exe 5088 msedge.exe 4240 identity_helper.exe 4240 identity_helper.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 1320 5088 msedge.exe 83 PID 5088 wrote to memory of 1320 5088 msedge.exe 83 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 1016 5088 msedge.exe 84 PID 5088 wrote to memory of 4812 5088 msedge.exe 85 PID 5088 wrote to memory of 4812 5088 msedge.exe 85 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86 PID 5088 wrote to memory of 2256 5088 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/open?id=1KPdgtLig-DheEHUp6tkZCwflu39KxgrZLMF-2s4H8Ec1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe485646f8,0x7ffe48564708,0x7ffe485647182⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,800289880822932718,14999176346351630939,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5c82b203f525ccc7de8418c6232e00e28
SHA1cd7ea8f396298e34f6cd41d282f57e83204d7c8c
SHA25697a3075123d54fafed06761afd2f68c6013dc7479bc7a3e52ec19ff1fa520139
SHA5122888e5fa73140ea876be851938f5b031fb7eb158d3362a45cf26fc6007b68082ec0868d84732f239ab739946ab5f79650028920e5caff4415f755b455bb1f028
-
Filesize
1KB
MD5805d9d6b7dea6fc1d439ce6f2d74fccd
SHA16d0e4cea0efc57c134ee4ede5a3b4cd44ce68373
SHA25650c66b314f186037ea73b2b7bf93fd56d2802a4e8de4d90eb009120c93297257
SHA512f1fd3d1c16be3e1fdb19046c03d11ef9df70dc092535b0ac8972759f5c411b929a4b34be6e23f45f96db80e2cec75c24487779b924051cd23d60905d9e3635ae
-
Filesize
1KB
MD52f82426b13462485c0f177d068ed816a
SHA1647f545fa0cedc35d3728d2494b60e56f21a3eaf
SHA2560b4f0ec9244fb2627368755c74bec278f3784e75bbffd965212d6d61937fb09a
SHA5120c6670758ee0c9c991d33b03bcee4e36c775a7b7e2274bcead35f25d66cd498efa162e13396bb59a0364fcfc3dabe336e34efc5ff6430c9de8241a737288707b
-
Filesize
5KB
MD58afd4780eadd96bbc2d309129590e33c
SHA16a3414f40e64a3fd8d9bb33034cd1ea213b23d94
SHA256f746eb447780247413a704aefe81c9cb457480f2adb78085f43f79a0f5d178b6
SHA5121baa0181658f66a7e86d871da7078585105a2a07b53d2aa96323529f54b72d263988bf729d8934e92b9548509ab474e1b68bb75903b0ee34c2a3f4e77bbb1a49
-
Filesize
6KB
MD571fac004101ce157b04aa9e8b0d418e7
SHA1a3867cf0802eeb5887c72519f6fc4f7abe1a42ae
SHA256caf38103682820a473a6c1825a97fec100cde2121fe3a19ffcc5cfda8cd1ccc7
SHA51295cb2667de7f9f82dde65e8a64841573c2a9df6d1c895b614f6337bc630e3a101256a143a1dc2afecfba272a5fe3853df67f43d224f8f5a8b53c360640a01bd3
-
Filesize
369B
MD5de50db6ca4e4b762798bcb3bbf0acaac
SHA1ba5df61821e942c78d810a124d9fe21a4b1529df
SHA2565ef740a2ac6476f7175464ceb009b808b33a8b31e3c3755ae0e8e7ec2946de6a
SHA512a257c33880568f49f57fe530f39e2a8558d56cefb830b3103a8c70c45aaa83d4c38ee663df8eef933ba202ef12d54e033ced823b3036957fb433f60b69bb42aa
-
Filesize
371B
MD546265abc27dc2ad182eb0a494a119142
SHA168c9b92469970980ef7c2019ff4dd6ebffacb791
SHA256e5085564ac3e05f4897d3ca816aad8b279fa1d6f9058e0fcbfc2f9807d4f17ad
SHA512d2a6c136c0db6ec2670cd1c22eb7c3faefc50df6d35d18bd48bdadb0892f3ba782ca0367a18fe108d1863482fab19ac47266224bdc89df604ca9812c135f0257
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f2623ab77551d08398295ab2fd9b5671
SHA15cc18ff3842d9a136b3a9c537452af689c64ff4c
SHA2564a5772c4726b078a68a554d83603eab94275527e4d85386f9b4a2565cc009e14
SHA512ce82301c27687d68741c5c861e83dfba34df6d24999e02347cb84fe9e8ccf700ef44d24f49a070a296974c8d89b35029fff8ace3ec7fa6a02c553bd0b791ce85