Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2023 07:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1C7W1gieiz_kAkoLaaxk7y5pxJhG0mKQk/view?usp=sharing_eip_m&ts=6517ced4
Resource
win10v2004-20230915-en
General
-
Target
https://drive.google.com/file/d/1C7W1gieiz_kAkoLaaxk7y5pxJhG0mKQk/view?usp=sharing_eip_m&ts=6517ced4
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133407924571076091" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 3284 chrome.exe 3284 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 4672 1696 chrome.exe 61 PID 1696 wrote to memory of 4672 1696 chrome.exe 61 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4912 1696 chrome.exe 85 PID 1696 wrote to memory of 4556 1696 chrome.exe 86 PID 1696 wrote to memory of 4556 1696 chrome.exe 86 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87 PID 1696 wrote to memory of 4588 1696 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1C7W1gieiz_kAkoLaaxk7y5pxJhG0mKQk/view?usp=sharing_eip_m&ts=6517ced41⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0d9d9758,0x7ffc0d9d9768,0x7ffc0d9d97782⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:22⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4708 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:82⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1876,i,14881368631332697046,17619118850551623164,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5c1ee18b66752bc219ddfeb167ad93194
SHA150560346b9ddc2e1e962e4a20ad7600e7ca790fe
SHA256ce5e8a1d97ae7e3bb48dc41ff47dc8d86083d9309ef4e16738a3c6d5fa6dc2a7
SHA5128398c0dc352e5de37b8e5edfcb22d22b2764d3734be64a68b60acb77c24fe878ad3b0fb66edfc3eb1fef02d71676df5e4f163c11856400b44795b9b763011079
-
Filesize
4KB
MD5ab47c0d190fcb56e60b6ca3c6e1028f6
SHA1e310eaaac145591ebf9d8c594f6849ee708571bf
SHA256c35fabe66f2174cd48fd5dc35061bb524e697f7795a5898a48de50783f797f61
SHA5120a26443e1c53c50e4c475062dd48eb2480b3151a553c9c7b3bad7d54cb8aded3f27162810be86ab13b6ae0e8511efb0e69bd370779bdbe6000fa2dd185c516bc
-
Filesize
3KB
MD5f1216171f425e0c485536967c12312a0
SHA118fc91ca0a2248267463c1936027ffae0f2dddf6
SHA25670ccc0f58be29e51eb476926f6228ed0c62d1fc98893f151ca44ecae84c518d5
SHA512e9a95e84abd4651fb13834b4dfcebb9f8df44e044d6e2b64c2e6650cf7531d29f52dc64323069674adffbd60fc81a91f6a76193a32c18bbce886617b222504e6
-
Filesize
1KB
MD5252fc7ebdebb91d469eff1c5ff822b42
SHA19cf8179c26bff6d174cbb2e771bb7a5003133ce8
SHA25652a20989a36370d9f016e649df31e3a1fa77f825b98bc2850518a5ec2ef7637b
SHA51213efd58910b41bd90f2d7bc91fa1d32e7e324877d898036919196cd551ea5b1d266e733397386bbbf7ba561475fb775adaf5ab492875b810e97c62a47fab392c
-
Filesize
5KB
MD57b5183003731e95f7e9632f7df522259
SHA101657ee80ff7a8f16192b491e09b2990f6b59454
SHA256a6d472be045996702be3248636f5ea60ae91b5489fd8806e776eb98f59c2b490
SHA5120a9802dcd2e651b80684dd9ffe06c21d61fa6457835f0906971410db4568458411ee6ac4ac49b838058cac21374bf044f86b85786cbd37da633c7e8f5f6775a5
-
Filesize
5KB
MD5b636c5eaf0a344bd5064db9058f5fc75
SHA1880fbfe3b3c31bcc8526e9acf3c876106dc752aa
SHA256cf086158b7fd292f43c3869e3bd17f906d90ad9f8a0918223c1d35a6069046e2
SHA512fb2e18572577a49d263bfaccdaad0fd62f937bc331461ec0586ae0713d964997cbb66bffa9ff529115a2c0d550ef47b03a8fb088554afeb95646e49d8dbee038
-
Filesize
6KB
MD5e3cec68cf04a174fbaa7f1b251396b71
SHA142370a87c4cef6681a7df0477adc53e3923286d2
SHA25640cd958a60acf0c16bdecd289e238aaa92f4b362049902f28fd770008f5a9406
SHA512c44f24727495b58a235e842d1c2c89ee77abaddf441fe33fbe44c437d95d0ef4dc1de133028c52e95d8a87bd134ebe4b426549f93f0fb28a5ab48ce9af7c7f5b
-
Filesize
101KB
MD5be3fccbcd43bf580845aa80b3536c175
SHA104a619fa079ceee411cfa7a0d21af4dcae75e36a
SHA256c9922b4e059cc8dc0b9a696fb181d6e6b9cc1cda1491f479fb41002054da6ada
SHA512a387ed271041480095bc3a11e92f75a761cb075375b1ec67afdc56877d0d47d8bd628206a6d693e10182c7a58020407aaf949b002ff880ca11ed862073386c9a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd