Analysis
-
max time kernel
24s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 21:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1hNgN2t1KdUq8a3xRrOpAl7BxK_d0xjqq/view?usp=drive_web
Resource
win10v2004-20250129-en
General
-
Target
https://drive.google.com/file/d/1hNgN2t1KdUq8a3xRrOpAl7BxK_d0xjqq/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1900 2116 msedge.exe 84 PID 2116 wrote to memory of 1900 2116 msedge.exe 84 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 2444 2116 msedge.exe 85 PID 2116 wrote to memory of 3944 2116 msedge.exe 86 PID 2116 wrote to memory of 3944 2116 msedge.exe 86 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87 PID 2116 wrote to memory of 3992 2116 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1hNgN2t1KdUq8a3xRrOpAl7BxK_d0xjqq/view?usp=drive_web1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff846f546f8,0x7ff846f54708,0x7ff846f547182⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18203920837124862102,10331373801622717289,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,18203920837124862102,10331373801622717289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,18203920837124862102,10331373801622717289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18203920837124862102,10331373801622717289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18203920837124862102,10331373801622717289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18203920837124862102,10331373801622717289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b9013b8bea41aa2c8fa7f4763168069e
SHA1349be86bde65cc0c3a15b2b21b6eaf2db452e92d
SHA2566245436fe808740cde15c227fcda465a37a52f17f3642a71f0abbc466ce5b466
SHA512d23bc18adb6acf9eb36fea85becb7b1a004bed034ef443acc3d442d1364f2ffa17f57e8eb6eeb1702dc459c5c16763b4e72249e6a326c9c36800d3f395fdd326
-
Filesize
152B
MD5908f9c2c703e0a6f81afb07a882b3e30
SHA153ed94a3145691e806e7dd8c160f5b459a2d16ef
SHA2564436bec398522c5119d3a7b9c41356048c19d9c476246c76d7a4c1ee28160b52
SHA5127af7116a91c8e3dfc23db8a78d7aff9a8df8e3b67df7f4ee66f9380dba4d1e66d980afaefc5dc2d9034ab5c0b7c6934400feb32645373f3ff4f8816414ae6ff4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5394256f-076b-426a-9b5e-0b75aef22de0.tmp
Filesize7KB
MD56361d8f628d782484155627f9eaa4834
SHA141a8a61706e5b9d2f87ffa47a036eda00a3f2a48
SHA2561a4bffa6c4fa93e572cc87828ec74f042ea2cb2df095f29149ceaaba378ef059
SHA512cdcd90514b53b455433e0693e3dde46790884274ea3e14fa2f7ea76a2290b37085ddab850abb486f25a9759922c29600e7f16e6fef1306281d3402280602cb89
-
Filesize
6KB
MD54af74471c5d1b9f662f6bcdd4b18a014
SHA1094aa8f43c1686644329a045d4aa0076dc359fb3
SHA25698a740d1cfd03e52e287afa742ed1e552e138e001b49b5485358514230a72622
SHA5128a0a5fb5b8f605b1eb8e46abd39cf7bb35061aa7678bd43b38bf59f1282f4f3ed4275755939cac232e6837b236719d943962872a8f3a6a91a2ed4be7c4a298d5
-
Filesize
6KB
MD59fe7f3f402ac62bd42bebcb2e0315c64
SHA1e7a537d14f5564ac4191bc585052f7895d4ff546
SHA256b967e476fc3ddaadace7a069fc56499f3a50cee6eef04ac2fc545f4e0bf9b2e7
SHA512e5a0f3a46509afa894ea234f010e7a06f447731004c7f099db2bc67bd62fdcf9f7471d53073e3ad2c474142b3a5cd68160dbb46b946cacd25cfe24b39394320b
-
Filesize
872B
MD517f68c69b019bae32dd6c4a1da66320d
SHA1a114beeeab6a0144d56035ff4158f10e8ffdabe8
SHA256e4d51ba6bf1726e8dcabcfcdb8112912bdd0900c6c7a4b07fa9a86c46b62f1c1
SHA51268b8b4d900c5d05d962d99edff4dbdfce015e2f24d1f45488c55f25f6789b641d325cfdcdc18e13eabbba5cf08647ea22a3a2de78363997726d336602ebc271f
-
Filesize
203B
MD5d70e32458e0fdac099fa5693b237c8aa
SHA1c96e9bd0b9daf85a5ab5e0ab73c70ee1c0b0923f
SHA2565ecc7eed8d1ae84d8ed9ce74cd014b4d786f23c996bf1d05f646719076bcd369
SHA512dc4284abf37244bc4892bf768dab950ed9d4516bec9b0aab7757a69ca7393a2bb25e3f37dac792c68bca53adf1f104e10bac09220811f031d438406de195bea3
-
Filesize
10KB
MD5ca9755f311bc4c6aa29d883459439ad7
SHA14d638f0f38b70c6462a1c69fc82293e61b536b6f
SHA25641a84684c1645f1b82330b02ac293e2f34b4cb24d7d158e46461a22f5d92be4a
SHA5125563f08f94af8c302bdd8a41947b2da6afce41dd533988e0cfdb3f219d235f479a5988b75dd0cfbeaf0732fddbc43bce29d75e0bda2e7c54e1aba2fd152201f7