Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 09:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?id=3D1thx= LNPFgeI1cqNk2nDE8dq-FKThvyOGZ
Resource
win10v2004-20250129-en
General
-
Target
https://drive.google.com/uc?id=3D1thx= LNPFgeI1cqNk2nDE8dq-FKThvyOGZ
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 drive.google.com 3 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 1704 msedge.exe 1704 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3548 1704 msedge.exe 83 PID 1704 wrote to memory of 3548 1704 msedge.exe 83 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 4532 1704 msedge.exe 84 PID 1704 wrote to memory of 2784 1704 msedge.exe 85 PID 1704 wrote to memory of 2784 1704 msedge.exe 85 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86 PID 1704 wrote to memory of 2276 1704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/uc?id=3D1thx= LNPFgeI1cqNk2nDE8dq-FKThvyOGZ1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd36ad46f8,0x7ffd36ad4708,0x7ffd36ad47182⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2768 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7411024317129309026,15455349021883119031,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bc29044ff79dd25458f32c381dc676af
SHA1f4657c0bee9b865607ec3686b8d4f5d4c2c61cd7
SHA256efe711204437661603d6e59765aba1654678f2093075c1eb2340dc5e80a1140f
SHA5123d484f755d88c0485195b247230edb79c07cc0941dedbf2f34738ae4f80ba90595f5094c449b213c0c871ade6aff0a14d4acfe843186e2421ccbad221d34bf54
-
Filesize
152B
MD5709e5bc1c62a5aa20abcf92d1a3ae51c
SHA171c8b6688cd83f8ba088d3d44d851c19ee9ccff6
SHA256aa718e97104d2a4c68a9dad4aae806a22060702177f836403094f7ca7f0f8d4e
SHA512b9fc809fbb95b29336e5102382295d71235b0e3a54828b40380958a7feaf27c6407461765680e1f61d88e2692e912f8ec677a66ff965854bea6afae69d99cf24
-
Filesize
783B
MD56cd6723ad6306956537d711bda50ff86
SHA16b00528ce20cca338bd1b182a402ea7dcf8dffb0
SHA256f7ece6d3195256e64f97087c2099eaa11c16c2d684048e670a714406d3db00a1
SHA5122abfe5a124171db684452467324f6a311daac085b246c2f5655add9dfc2680b5f4ff5879776b589b198a4e7e6ec4e178b2fc764db52c54bc58f2c28469fc662d
-
Filesize
6KB
MD5ea56df4e9b4b3efccdf0a99fb4530cce
SHA151da3cfc27ea69af73ca5b93827662776e753aac
SHA25693650bbb51e7503b50d7f192a6c5a961063ffd441e49ec27ca84513ea71169d3
SHA512d9f7fae971081db0cd43da8069dd9c599e795bd6b2cacd2bb65e521e5053594e8e3ea42818534e0a9473982e27745f556c512f58ded5819022abb1958f011eaf
-
Filesize
6KB
MD5e9ea12c67c4685e183129fbaa46b414f
SHA1af03915feda79a820d1d1d505876178f1508e45a
SHA256cc9c200ab88c88e8baa2e4a28bc60b199256ec1533a179f60aed24ebe2ddd2de
SHA5125cd553c6c4b0a2b12ef6c743d7df98de10d0c3b386c452dbeec8e371e3235bb1a971d122343bf54cb944dd1dfbc2b99eb091c19c4ac5af7289098c9d15215ea7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b2f3f06af6af44c414fa8cb29ac60738
SHA194669ee2bb0f40e4120848571eb38d6e1b644581
SHA25678d54dbe44488240a501d323aa609804114c86f1a1b1bf44fc22e764a91c012f
SHA512fd87f07e8aba817284e1547554de1095e25106e6f73c1c13aa42cc4a9e303d602ab287c62c3ab6613f43e203ea41f9e5a9271dc8b2d9ba509a1d0cedc4c7287b