Analysis
-
max time kernel
16s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 12:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/open?id=1HOWIG1UgslzcBauFiJsFlJ90K4hNiKBi
Resource
win10v2004-20230703-en
General
-
Target
https://drive.google.com/open?id=1HOWIG1UgslzcBauFiJsFlJ90K4hNiKBi
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133329487210973463" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1832 chrome.exe 1832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4676 1832 chrome.exe 67 PID 1832 wrote to memory of 4676 1832 chrome.exe 67 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1868 1832 chrome.exe 86 PID 1832 wrote to memory of 1200 1832 chrome.exe 91 PID 1832 wrote to memory of 1200 1832 chrome.exe 91 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87 PID 1832 wrote to memory of 5040 1832 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://drive.google.com/open?id=1HOWIG1UgslzcBauFiJsFlJ90K4hNiKBi1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffadd019758,0x7ffadd019768,0x7ffadd0197782⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:22⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:82⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5036 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1888,i,4004865387130780323,13342475151073411276,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1172
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\74718e21-3615-4787-ba4a-96fc9c1917ef.tmp
Filesize15KB
MD539c13408d3ab522cfa24e31e296792b8
SHA172dee2ff05423972f862d43a99ba49852af52377
SHA25653530f7c93cf6fd88e20b8c98dc9d7cae0b99b889197c687969ad99dda8c94e5
SHA5120f9c75ca064d01bcf292c9b9b4f4499e1b10c0c83ac31d962de38c1f67bc7e1474712ea665be40f4d8a13fa97234d7462a5895f678e22a670d562a1dac0c5f38
-
Filesize
1KB
MD5e817ce154be03c6a48ddd4a827892a42
SHA1a692b96d8e6322b11d5e457cf2643f8a2a8889f2
SHA256bdb9156b0b62c11545f6dd53ebe2cd51c82fd72b91bbbba75d66d3d6792d11b1
SHA512a48741031a2fc25c6e6e0bd56076ee2de4d7d3bc5a09c21eaff634eeacc75b55ce6232db483888b8b6421d5dcfb57ca3eb95fc977a724ce9bca8b679db291aed
-
Filesize
6KB
MD5fb8e6b34ea3872148564f1d4d08285ad
SHA1112707cf7135247adda188c55d4219e498bb495f
SHA256ac6c6fa0efcf454c4b7a82dfb54a1a575056d67116bd6f3b0ca0abdff71b9b96
SHA5122113b0a352f929dda260988014cc68dfac7a2aa9fe1e836b87a5dc8e8b27a718f0ccc6b9f1119c10704ee46584cabfcdd4124b977db9b58f54da3f3e1b99e84a
-
Filesize
87KB
MD5441b360bf86c06a97debb5d6dd350a0a
SHA1c073e92f216b50dab2cfb7e1331471999d1311e6
SHA256576924274ffb3c4570d2ceeecb6a1fac57a57a30ae412800f610ef9dfbe11ebd
SHA512e3fa0085a80ea552e7387fe87c92c10565febc1036c091972660ec3d44624976542582ab9cdbc5adf6b927d2efeece3da3239331939de34f31d9ee359df45f7c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd