Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 20:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1nhW3kYXN1JFF3S4unh37XsDhFGNrebzw/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1nhW3kYXN1JFF3S4unh37XsDhFGNrebzw/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 4816 msedge.exe 4816 msedge.exe 2780 identity_helper.exe 2780 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 3940 4816 msedge.exe 82 PID 4816 wrote to memory of 3940 4816 msedge.exe 82 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 2384 4816 msedge.exe 83 PID 4816 wrote to memory of 1980 4816 msedge.exe 84 PID 4816 wrote to memory of 1980 4816 msedge.exe 84 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85 PID 4816 wrote to memory of 4560 4816 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1nhW3kYXN1JFF3S4unh37XsDhFGNrebzw/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff911c046f8,0x7ff911c04708,0x7ff911c047182⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12874948020261002477,17338669353924246811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:3080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD590010dbb685b3fb6b5ad4ed789410384
SHA116a56cad9b07c86033e96392fe11d67999212e94
SHA256a1bf7d62bd05a5b79e2ff958acebe104b68e42277bae1afa21994d7e3ab011a2
SHA5120f05973d5519581a93aafbc4f1ef139b05f7f622da0a65ae4cd7a5b0a4ec521dc6781e5a5802f4d47460f69a9f8377db8d2e74c23da2be55188009b1791c366f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD53aa05df3f8aa422c7de91d383e5cbd83
SHA1a55e1d28edff665a5dc741fdcfb916111d59cf27
SHA256ec99fd40035964d6019b3080d7778541fc297b68eaac706e78c87de0ecd1a328
SHA512b4b92156cae5e3fc75a5187fbf2c7c6fc858e81c0b6c769f39cae83583a8d8ff68969f494a369e0b20dc13fb98c11734e49d43d78623543dde74fd5e79224111
-
Filesize
4KB
MD58d22fd9f0a7b19bc1fd96e5e52f852ff
SHA136d1fc2fada26b978cee677aba66842a382b01bb
SHA2560e73070ddc1c73574110c384c8617172f11b8c4f426315e0d727a5b7bafc44c6
SHA512952ac9ce6d84ae3b1c48d5f85e52e9140fdceba4b696029673ab54d7a48652b828a7db74412045b6425662afc4264307088e5680a3dfd2798064afc6a59ed389
-
Filesize
6KB
MD50de6656a0fafed390837658df561257a
SHA16fc4e24d418bcb9d3f8e9648dc56e9d37057dafe
SHA2569072d1d4c55547c5fffdd9809a281218c60a99323eb70a3fb673d44ea3027213
SHA512a70f5e3631b3977315765c8fdf404eb33eea31178ff6c1f4d5bb163786c9d6783f75b3309bca3591bedce823d636a6f4b3e1f9b518762f66c087b90ff831a37d
-
Filesize
6KB
MD547ef34baa78449fb763c881b7da4b10e
SHA1247d1017346b1aa181d57ed53e48ec3c91d66d3a
SHA2565dc102d580caf651a655a5a08018f7b39e644fa9f80420636a63713520cff52b
SHA51250595e89bed24e6f7eb2ea270edb6d4c8ed15d79ff23bc7a1aac0812584eb71c27e97aea84a8e8df89fc4577071f87910bc0d8bcd532f3b4e5c29c579c0266d7
-
Filesize
6KB
MD5ff26678cc338d58ecd585525e9e85869
SHA11ce7173d1f1bbc0336a6eac1ab29a49c4431c4b2
SHA256e6caec6db4219dd7fd7bc23dc3cbd6f0fdaa07d0705efd3463b47568e0c0003d
SHA512b50a835e82fd7ca556d8a849a5931725be27224b7d8bf2ec9e5a666a6ff705b1fb15ad1ff7f688d3c9a2f395a702b3dcdf627cbc58a0a5795a8471a45472e550
-
Filesize
5KB
MD52de402dc666cd1ba9296a226a1621dd5
SHA12499a8e64868bbaeee9dfa550f7acd9f17e7c617
SHA256b8ad0425f5b6f6ea97f82378f1e537d061bc6aa73a0ea5b5bfae7460bb8542ee
SHA5127a657eb2042ff9098adb6efae8be89a0ed5505a517da3b208c24e33d3baf0451633f7ec94e9c20c5f6ff1387a64c10086bcff14dded3107dcdfa747914b57de3
-
Filesize
1KB
MD5b94e54d7364e4c434f921a020be620ee
SHA1b9ecdab08e730ce255d0ca95676acb24891261df
SHA256dd7ef3c656a3b0b08016dac1e4ccd274ae96db542c34b576c04287b9ac4737ad
SHA512656b7bbfe742cb495413697cff3cd3f7c652a9b7d397b80498045764dad98224242f701d6db8c4053626a1df4603d4c4580b17436978158f96102d7c591ab512
-
Filesize
1KB
MD548911658e7e8c53c8e55fef00dd4e319
SHA1a055b1dad9de5b4106f0ab7f312fae76fc9672d6
SHA256937460b4a58e8f7d2b7a7b892fa8714251ba0f5d20d681e71daa623c066b335d
SHA5129af7c789af384c5bf397b93b93a29b08ecdd5fc34c22e2e48d50b442dcfef6f8672c26cdef848e9a48145a58002a769597671cbff3082e5fbbb8b4d45a57453b
-
Filesize
874B
MD554387754fe869933ef200851e01e3695
SHA122e56b3a0f756866041e7b8859315143008a9a8e
SHA256ab670b67e6a38b407fe8ce6172c9835a22382a3fb2229e9004ae3b6185819d93
SHA512eae1d3af07ad4beb3e91563ccc0f1bce5998e430c8ac9ece640b8c888c40b344e76375351ae4a6abb8129333aa040525392203f9b3bbe300d255356eda71d7fe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d5fa5f557a1a9f4b65df860386a49ab3
SHA182d3691e4fa786c98924f469107f6d6b7e2f59e3
SHA256248e4f384cab3bf6025a76ea12cfff2f6b4b56e2a06e5cc9fe07ccd11dc36364
SHA512146b3b704999436dad12aff811b9f20b53956f88c127c246ee89fc312f249ef02e1442fc1a8770834c44c7673eae3a10f22a1af202f28ebc031aeba3a56f1159