Resubmissions
27-01-2025 11:41
250127-ntm75sxpcl 627-01-2025 09:30
250127-lgjyvasjcz 627-01-2025 09:26
250127-legqps1rdy 6Analysis
-
max time kernel
54s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 11:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1qiGFtovPo8iSTFMbtlwZHUl2_mPjSIxz
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/uc?export=download&id=1qiGFtovPo8iSTFMbtlwZHUl2_mPjSIxz
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 12 drive.google.com 13 drive.google.com 14 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4684 msedge.exe 4684 msedge.exe 5004 msedge.exe 5004 msedge.exe 2436 msedge.exe 2436 msedge.exe 4608 identity_helper.exe 4608 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4424 5004 msedge.exe 83 PID 5004 wrote to memory of 4424 5004 msedge.exe 83 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4692 5004 msedge.exe 85 PID 5004 wrote to memory of 4684 5004 msedge.exe 86 PID 5004 wrote to memory of 4684 5004 msedge.exe 86 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87 PID 5004 wrote to memory of 4324 5004 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/uc?export=download&id=1qiGFtovPo8iSTFMbtlwZHUl2_mPjSIxz1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91dcb46f8,0x7ff91dcb4708,0x7ff91dcb47182⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,1565574985590953300,5200179233285795619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:2184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
5KB
MD5e9ce4340f304272a02506ad5afdb26c3
SHA1be14567ec75ef42064ff827ce707aa3e06b43d7f
SHA2566b9b46675a48275705ac89cc19d96ec37557ee8f7d91ae6bd0d479572f866851
SHA51294fadf2f80f3a9bc1c0874f72962aeec6f5ec81f1d5e498db9789133b1cd3b578fb6a323fbb20a3875f05eac3f53d46fdf6866d4907760c8fd1fee1f28c62892
-
Filesize
6KB
MD57c6bcf51ed3dadc2ace4b76bb465f6d6
SHA1a0394a72a2181e286af1b5e55c34fd3af1900260
SHA2563f6cbb45e6c099bf1cc735617a2cbb06791f3738944ba8e1067d99db52662f6a
SHA5126923d401db06524de17482f944c74e8d8404ada16494af42501cd732cf733d11cfff8caf51264f569e2b1ecf3c4240c0d692bc8e542b664d4874b167645b56a1
-
Filesize
6KB
MD5fe8f43ef989d6c49b2c1f7749a2edd32
SHA1a22c0a82b27dbadba33b12e8b1af05281cab6723
SHA256fd0a37a03a34847e6fdfc6658c825083923fc0dc6868d98ec3d057a44c52b19f
SHA512b698abb5b02ad3e3924cce7f037e2d96a7ca63b96e696371e6ca81b3f4accabe25e7aa339e472350f9fa1db23767e403d5b7b4d6abfa25133e13711a452a643a
-
Filesize
371B
MD5d91a4146cde9af5920c691035fa55a83
SHA1edc14acd4a3765c5f371cb4826dbc55a897bb552
SHA256ab385fb8acc1d58659f8bc52d587866603f725f362b6b9bcbb7058d9c1e71085
SHA512b5a1b961a26f3d2c282d758d3608ef07cc17bdd3f9ea1a6ba4319302ceba39a113120fa1d56073cc256beb3edf259bdc62a88a52b6e3298e9a8ca9d2634538a6
-
Filesize
371B
MD54056c0dad14aa789662594876259bb10
SHA10988d1d45c53801b3c8b612edaa6527287cbb625
SHA256b8369089987d47dbb1bb26ba80fd3ee40984f46656b621f7ec78af58839a9e88
SHA5128c5d72b8221abdaf0a85f515c224b9518a5ea0d956183b3fab4bff384797d345db36421c42a6b9172d3de1d6495109f9a1fabd6eb95fea2e33bf84b39aa92d5f
-
Filesize
204B
MD5c263a2c29abfbf8d2b6c40dd9029c1f3
SHA17f25a31b3414457bda8cf55dddab2357cac47c06
SHA256890958456e4e71bcc1f551c5e5ac08a8ca9dcbb7af0a2ae189eb80d2ee79cdc9
SHA5126d8b97d1e907e4d710e8865fecb724c3a511858ac2f43e9675ccb053a274be5ee013dafa5aa7201fe04816321d6cde884301e57ed23c9e328abadc0dd70f8813
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58ffe1679c6d1f21e32da29c9c52ae4fd
SHA1db6bbb1912d38b098a9e26514100c4eb14d6e1df
SHA256b99b63ac1908c1024bf88890871ced5f82c06265f29d6c79c025ad3b00719573
SHA51256bf23c257fb05c9b0b7969f31ee72906f71238575d0f5946ad5043149489c3386494ab4f64e1f44cd897d9dc908d3d2ddfae0a62d33ebb13b12d9b4a3a23373