Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 19:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/12_FHYiGAJjr_9k7nMRclVc5d9oFiJjga/view
Resource
win10v2004-20250129-en
Errors
General
-
Target
https://drive.google.com/file/d/12_FHYiGAJjr_9k7nMRclVc5d9oFiJjga/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 drive.google.com 18 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 4544 msedge.exe 4544 msedge.exe 3012 identity_helper.exe 3012 identity_helper.exe 5168 msedge.exe 5168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1516 4544 msedge.exe 85 PID 4544 wrote to memory of 1516 4544 msedge.exe 85 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 2360 4544 msedge.exe 86 PID 4544 wrote to memory of 3944 4544 msedge.exe 87 PID 4544 wrote to memory of 3944 4544 msedge.exe 87 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88 PID 4544 wrote to memory of 3996 4544 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/12_FHYiGAJjr_9k7nMRclVc5d9oFiJjga/view1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb826d46f8,0x7ffb826d4708,0x7ffb826d47182⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,3130670387513817432,8677431290001652671,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:12⤵PID:5272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562e6ffe7501e581c80b178323e921b81
SHA1d0881a3d0aee1c256291d34a90e3092fffa60ce2
SHA256a4f50a6b36e27013a694382c996a1d3059d38310a138f21aa25cc682be5cb0e5
SHA5120c4e34fc9a7c5308b1cd05ea71d78c75a9fb85267d7f3e5616dbc1390794941eb549bcc70f7430046ca79cc0055edf0bd51b8eb43f84ee42163dd34d612ba137
-
Filesize
152B
MD565a84cd7925378cc74972cc4e677ecef
SHA130b4da4c5dbd0cc77d756d270ad260ef74987ccf
SHA2567be0a4cebd74cb4d879e3f9950f5ac5a05acc3bdc415bbf9d3dd691cccee2cb5
SHA512ef142224cc0b94a1c5585836988a0d544e7e8b5e8573a1893c9fac528a1ccbbab6c9c7acaad7cfec1a415544bbdcdfd1d0c5e0a0819cb94107fd81989df18704
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5c63800264b1a0eb7c96531b72d83721c
SHA16c21cff7714b43a3840e5a32ab740a856398a590
SHA2561255ea2df1749819d3b1b9ac998694233ec1e59378a9cde940e4996286602efb
SHA512ac85f7326d8aab7eb478a3e363b1d7371bc108e443a0bf336d1eded98367828b8ddbec9c4808fc1c7242526d955a69b055a293ed02f718af8fbdfec9b9616553
-
Filesize
5KB
MD58fa1ff31d5cd8a4a35fee1fef3d3ace0
SHA164bb659ad8a05b22cf91d489bc54762dfe36d559
SHA2564841d5afe7bbfe2a7a35cb07966a24cd06abb5a19871cbd6644a6d5b877bbf8d
SHA5120e3297436ce02a711fb87cc13605ab6bd3d680560143615a2444fc7541050931e0167868bbca9ba3e0d1d2e797b153b80b8440a40c061bd9a73117ffc4aaaca2
-
Filesize
6KB
MD5757ca1636b0c01f2ea8a6e489728e21f
SHA1feb309ce2644e6640c573f493114e511ccf58d14
SHA256f6a1d86788d988d162a1ca49c4b9b583f9735712b5aca56f85331d0727c8cba6
SHA51291e9d1485439c6c7821245a97dd027ea8083d7518d4756eef8a753251f65cdb8d9c0f592c134d971138eb18682408853e17b9a400651b38cb520fafb5afe0b1a
-
Filesize
6KB
MD5f33cc3ada7a6c7c74daee9f38af6b3f0
SHA1837396052b3cbe06cf43c0ad80e44c3ced326cea
SHA2562021c6ccc5a8e65a4ad491d64c9abe6d4c077dab28d5f4afc02f74b7e953785c
SHA51235d7f567f9552b01d279b8f9cf14153e4a540abcbeb6053c13f7a80b7f8a023d8fed50e5def5b1926467188416c66534cc07700e7029dfd7685bcf72148fb87d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58cbacbd95fa446acd1d60558990d805f
SHA1e761c2888ff496da99c2d427b07ac6040cca7455
SHA25605b628e844aa51be108a6266ce2bf400723edffa75cb3d64d13866e3551dacda
SHA512a45feb30b1e878c39725c77922430152d25d27420acb3e14aabd056048c88888f4ed1b68b9e8577126cde41a1c1e63cae830fc9084fd4ea9cedb17ba2bc6d17b
-
Filesize
11KB
MD5affdc2c940f6b4e884b9f197438a93e7
SHA16ff1d77a111fae3a73542face1b6a9170a1090b7
SHA2560fe0ea1afde5a2b0ce9b02913b7d97d0eaafc6edc3b30dfcdf84738d86a66beb
SHA51233ea6b7eb9ce88ce3246952ee37008211a5efe0225121c01b3e0ab74c878b681921d87f93db80bd8a0557ef2d5ce14c0c5b33cf30884d67f4b6051b8f6012bc9
-
Filesize
5.4MB
MD5067d71685bbf0404d446afad220afe92
SHA18dc1d1aef752d46b0f75266a9a68562a5ced4b79
SHA25689df6029beea3d50c9067cd34c96759743878bbb878b23c9cb3564e112928b7e
SHA5126d0d8f0bf77c6bc5bb317e02c3a1397d765c0abdac69bd6cccaa3b1491928c64cbc7380901016410d910fe00cbb600e6ebb47a5be2c8b6420718cd0813f55643