Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2023, 14:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&confirm=no_antivirus&id=1kLQMHJ8dYdxNyZzuCWayTPpsycb-ZT-j
Resource
win10v2004-20230220-en
General
-
Target
https://drive.google.com/uc?export=download&confirm=no_antivirus&id=1kLQMHJ8dYdxNyZzuCWayTPpsycb-ZT-j
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133250062162046890" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1528 4268 chrome.exe 85 PID 4268 wrote to memory of 1528 4268 chrome.exe 85 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3804 4268 chrome.exe 86 PID 4268 wrote to memory of 3232 4268 chrome.exe 87 PID 4268 wrote to memory of 3232 4268 chrome.exe 87 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88 PID 4268 wrote to memory of 2472 4268 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://drive.google.com/uc?export=download&confirm=no_antivirus&id=1kLQMHJ8dYdxNyZzuCWayTPpsycb-ZT-j1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b619758,0x7ffb0b619768,0x7ffb0b6197782⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1776,i,9129228736189513600,6620344056026540594,131072 /prefetch:22⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1776,i,9129228736189513600,6620344056026540594,131072 /prefetch:82⤵PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1776,i,9129228736189513600,6620344056026540594,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1776,i,9129228736189513600,6620344056026540594,131072 /prefetch:12⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1776,i,9129228736189513600,6620344056026540594,131072 /prefetch:12⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4496 --field-trial-handle=1776,i,9129228736189513600,6620344056026540594,131072 /prefetch:12⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1776,i,9129228736189513600,6620344056026540594,131072 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3228 --field-trial-handle=1776,i,9129228736189513600,6620344056026540594,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539B
MD5356cd6fdb6d72336a605014f5825eab8
SHA1e4f07f062560b38d4093a0036f104aacfadec19f
SHA256181474d454749b473944ad49e65f5dafc4b95dff8eca052d92f776f2af589f89
SHA5126cb7d8ea8248921fcb11ed900d985b78eec26e23f228c3d12b10c9e0a62d418b17c2f3e00ed56aa7d13ca4727c52eb0c5d3768c828d3cf18c0de7a5bd028b48c
-
Filesize
371B
MD5dc2cb5816288f53a1fe1dee75b680fcf
SHA1f7b67bdb00802165b320bdd95130fe87688489b5
SHA256a8f7b3e5d52fad8dd91a0e9c66a79208d67b2a518cf7a754b5141e133e671e38
SHA51232386f87f5bcd6da68b62fef6eac070a0017bbb80d306a06901d11610bd225409a5632bee8515cc28de478bd8651227d017a88c07e1a84651cdef94ea24d049a
-
Filesize
6KB
MD5ce63d7b296286dc6b6ecf6b64bf3dd86
SHA14b25e5aa3a80599f9ee630d74b9b20edf9110c9a
SHA25612dae37ee3ed342ca839cba133d90ed31e231c40b1dfb02b71e8386ef156544e
SHA5123c8b14af1b320012af82cbae7665d17113b3ef47a895f89bbf57747b0f5cf81c37d3a47489a019b8941fa3fd259b4ec239b06ebdc9ff635413469a5088369f50
-
Filesize
6KB
MD52c0ac3c202a4a52368d404aa9a0ecc09
SHA177961a66a21d001f35e4af3ef4829f12d67b09b6
SHA2560b828c64785e09bda72afb61fee56d19668b3c0a37cc6fb66d6c6de5757f0fa1
SHA512677ebdafdfcf6f9f11679b3cd39fc589aeecb25a9b76c3cc61e3bb7b2f9b4c297ba72a798ef8f10de3226fae4936060a0b9140417d23550e175fd011897c993b
-
Filesize
174KB
MD530b50a438b189f82a263d314b5fe1d76
SHA1f0501c7faedc92c2ab4bac1103a3510021accb74
SHA256065c2ccd89231cc9f1fa1c5503f22c4c29f6629bea8e69dc442feed0a6e140c1
SHA5122fb147db1fa29a8bcf1901d655c6b118d2f36db98ebe5ce8b071ba8e3eec49e1c403f2d49059318a4e9002542a0d2902550d3e2ddec78ccc4e936f485318622a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd