Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 00:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1lf6osR8BQSlGDw0B_JN6s4EMeJlv-yao
Resource
win10v2004-20230915-en
Behavioral task
behavioral2
Sample
https://drive.google.com/uc?export=download&id=1lf6osR8BQSlGDw0B_JN6s4EMeJlv-yao
Resource
macos-20230831-en
General
-
Target
https://drive.google.com/uc?export=download&id=1lf6osR8BQSlGDw0B_JN6s4EMeJlv-yao
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133394714686001382" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe 1336 chrome.exe 1336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe Token: SeShutdownPrivilege 1756 chrome.exe Token: SeCreatePagefilePrivilege 1756 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe 1756 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1328 1756 chrome.exe 84 PID 1756 wrote to memory of 1328 1756 chrome.exe 84 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4380 1756 chrome.exe 87 PID 1756 wrote to memory of 4040 1756 chrome.exe 89 PID 1756 wrote to memory of 4040 1756 chrome.exe 89 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88 PID 1756 wrote to memory of 856 1756 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=1lf6osR8BQSlGDw0B_JN6s4EMeJlv-yao1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91a589758,0x7ff91a589768,0x7ff91a5897782⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:22⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:82⤵PID:856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:82⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2880 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:12⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:82⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1072 --field-trial-handle=1880,i,1889568054398740797,17259472381255676767,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5db49d9d8bb3e772019aeb3eecde98c0b
SHA1e7831c4fdc8533501a465dea4d16fe3c84ec6f42
SHA256a97cff885e5dbb54a9223e7e889b419255825eac14226adcff71d1b24491fe22
SHA512481ac47fc2d486bf9ed814ef1efef890e7d4a8a041dac2925da3c9a425f0e35bfa8c8d8073c2282c3381c9e5cb0a5ec39795d6354299bb28c731236a13f5bd32
-
Filesize
1KB
MD5a5da0884a0e71cc6c9915604c3a842d4
SHA1377e58d4b8b8618bd4f1cbf6da573116df74b4e0
SHA256b7fae810bd76b79ed37c61a20a4419d4fd7997fa6a9f981b4452cbbafc563e37
SHA512cb7f05ed2956d00af7cffedefdff228b258f3dbca4ff445cc955fa39a95be96c25ffed5bc481f9a18e538036453dbecfaceb9e1668992900c14aa2de6b97c08a
-
Filesize
1KB
MD5fc66b3770f5cc45709ed11d5e03ca084
SHA13b975bc08e26ecf42f9e5534d36bc3d0be4abca5
SHA256d77a2e9b5e89a849fc79a07bc24f7de244c5d08e7239087759864dbffcb95ac3
SHA5122a0991bcd160314c625996f867f835161138c5b5cdfd5e1a7d59d4afa868bf66903527a302da5ec57edc59cf45a861e135d87222572e48d29644161252254eab
-
Filesize
1KB
MD5042438a3e3e516a275d37f81100fa973
SHA113bbb109d87ae057b8a1d7d46dba70454c2a38e7
SHA256fb67455e4e397d7a875efb8132aa9f22e2c0cfee0993ce4cf546e0f30fc2fb37
SHA512d5c1741e235a5f92945f364e14da66e87221c82c61f66f98e899866c6d2041656f263904b7866d3eef98209196864991b35262174bcab50582afd2905627e84a
-
Filesize
539B
MD53dfdb3730a44003db6b0802e590f10ad
SHA1fd0a71f4ac79f90be4797a4fcc5318e64f90c306
SHA256d598993bf74b418d2eec4c60b0e3c1a71868551d5fb5358206e27d1dce757cf1
SHA512b4ecd9eaf7937c32e803ddbc8462e1a5b8cb90b38eba3de6caa9f31be336aa40b0f602a3b6af6edcb048eab0f306a67d507ecad7296d413f52a1ea38369afb69
-
Filesize
6KB
MD55eafa176a311f78c2cdf34b51eeaca57
SHA1d1e330a830ea4058ebad27cd9db4ad39f7d038af
SHA25616d7415f127846ab4a0c942d11184adb575ccf0efe770f739811b8142a0ff1ff
SHA512e3a9f08137b4b967b36c84a57306d5bfcbb64cf14b67f0e9f9dde512c726972aef67cf1b70950b15d9ecb10b8bf8404530166c5f2f843f75b10ff015c190ba32
-
Filesize
102KB
MD5faed8a417c2baf6b4c2206b3826663a9
SHA1fa28a541dcf31ec425b20b94a22ea5e5607dbe0c
SHA2564b7ec3789123ea0ca9359812dcddd5d0c9e8b42a02ecf591e8f53cd785d5714d
SHA5122d43d0152664d298d13bfbeb965db69723c50583c5af5c58c0ea2b5c039d48707c8153370fd102addae003ba34b700867f7a311b27d0c28f4a3a23e4243f14d4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd