Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 18:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/18mW0vDr1kSBNosZC4kLx8l1X7YU7eifI/view?usp=sharing_eip_m&ts=65a977e9
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://drive.google.com/file/d/18mW0vDr1kSBNosZC4kLx8l1X7YU7eifI/view?usp=sharing_eip_m&ts=65a977e9
Resource
win10v2004-20231215-en
General
-
Target
https://drive.google.com/file/d/18mW0vDr1kSBNosZC4kLx8l1X7YU7eifI/view?usp=sharing_eip_m&ts=65a977e9
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504219026923442" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4356 chrome.exe 4356 chrome.exe 3976 chrome.exe 3976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3612 4356 chrome.exe 85 PID 4356 wrote to memory of 3612 4356 chrome.exe 85 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 3300 4356 chrome.exe 88 PID 4356 wrote to memory of 1352 4356 chrome.exe 90 PID 4356 wrote to memory of 1352 4356 chrome.exe 90 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89 PID 4356 wrote to memory of 560 4356 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/18mW0vDr1kSBNosZC4kLx8l1X7YU7eifI/view?usp=sharing_eip_m&ts=65a977e91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2c349758,0x7ffa2c349768,0x7ffa2c3497782⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:22⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:82⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:82⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3992 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:12⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:82⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2620 --field-trial-handle=1848,i,9495586199583780331,14603953974180974695,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD58e726f705237de526d24bef1bf3a0631
SHA132686afb7c33d0ea65c413d773bdff6a01a59899
SHA256b0caf825c0456cc2e5ffef6801f361e34d5533c3bf55e3af0cb983e39343ba14
SHA512c62c7e9ee6d1c5408811099f5bd5dde0ea20dd5d9d85deec980b3bab8344eefcd55143eda98b995d2418ca20522420f0d2d6c8f18bc0ecb48ad32b4a5e2e8c9c
-
Filesize
312B
MD555015636b3364180b8d0691fdb6ef3df
SHA1d264aaf30656b44675cfec4835a938f7006b7aa3
SHA2561266d286cc417deed904a238a4183cf8e9c38f52f94084c19a37b702db114a4a
SHA512e93b0a46f9c4476c158cc0d0d7373e6a0872773407a02db7323f002b6a7b61997fede1c0ab156bba63eba855bb5445aa4e29227435cff115c98046b30e54db62
-
Filesize
4KB
MD51300526af8913b14bca9da2cdacee272
SHA1205ad3d7b2fb8363361f6a365dcbeebae7e21ca5
SHA2568366f2e36e41c9959868f518a36265b53431cb5455bc947b632ec06c02d8e760
SHA5122ba28334b7c2cc452e720348d2858cabeaede7da2bb9a264ebd95211ec3af1b77212c7c389c211c1cadc4c9794ec4c411ae58be9f438a393ab370188a8112e4c
-
Filesize
3KB
MD53c219eb7741cf707f94ab8d7610c5955
SHA1c1b41e303b1fd32928df140d45414f2dff8c157d
SHA2560212bc47151bdcd44016200a6ce3ee5617c0ecea7980b060199e55d609ccb902
SHA512a1b3b9c4e3f53abf768c0293fbbacb44df54f9a2d7c525f0cfdcc6f6e2b2dd1b6c27b7344200ef5b5c8e4bda5f9f22d233cc8b6ea7e6e433913af511447b3b52
-
Filesize
4KB
MD5b04cc334a010f5f50f73b5fc6a2f2109
SHA1453d972f4f67499e7125482f10c70b9595d40bb5
SHA256b87420028fd473948b6c0996ff1849f856ab5c4049564082010cf6bdd2c06928
SHA5121e97f4790920d1ea909ae4d66149932b05fd54bf0c83ff0f50cb33b9d8556728ccd1c32c12d1de595b5319e8ad33ece5ed2826f750fc9386feec368cf895711e
-
Filesize
3KB
MD529805ec14c8a0f43ac468c3f61d2c7ab
SHA1951a990115326a6a40091e0f7769bbd096765523
SHA2565a0851e943fb3b99d8ade6fda8100f1b36b9690b273b671ebbb0b0fa7c2efaa7
SHA5126ca8c92f138a9d7a4a7b69aed21c5aaf7efacbb5835716923d1afcbf1cdb426b9d975ce9fe62d27b7eb6904ffcfa8576ca50f4280b99bdb4e38c858b0f95ef3c
-
Filesize
1KB
MD53e05b45f9f76de149cfea2bfa3c1ae00
SHA18a4332553705a2d9798eebebad007e85545a8701
SHA256b3007ccc1c9c35339a2c4b0ecfb04cfa04d71ea6d9392085d86db5b4af137f2b
SHA512610ec659300eb5273eb271e7bb9f20beaaf9a1c790f9f3d2ae4c0cc173df46b3341110136e20f843632ad996caf26791cdb41157fb8242d8f2e31e4a6fce520f
-
Filesize
6KB
MD5e697d5c4ec4adca576d8765633367926
SHA151850bf0195dc15aaab4989e106710b4c95bc00a
SHA256180ffb9a5fdbf0efc88ba714cc8d37e793265eeeada24c2ab33a468a764c5d1f
SHA5125c6b2a8f17d5ba700dcfe24fc326fe9d538f3f0799c5d507e8e288337f1e8e6e2de8ccd608a04a6f03ef2803cfe8c6eb84ddc78df4903d9511f15fb1e83e32bb
-
Filesize
114KB
MD525394b43a0d993f4d9212c994f721e60
SHA14bf6ea67a0f307de1782bac8202efb4040c524c0
SHA256a4f51a80000e958c1922e60139644278e3a3f889b8ae032fe978976ce9362fdf
SHA5127ba444f3fd6a6d1060299ca55a2537c0f779f63c71c17ea47aa71cfcc127c7f1a84de488b44a59f7eb201287c12d40570952749ad0faa2386c4759a86ad34338
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd