Analysis
-
max time kernel
74s -
max time network
257s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1Ys8-viej1i1Qz81w1qsG0xie3BJjWRAA/view?usp=drive_link
Resource
win7-20231215-en
General
-
Target
https://drive.google.com/file/d/1Ys8-viej1i1Qz81w1qsG0xie3BJjWRAA/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2384 chrome.exe 2384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe Token: SeShutdownPrivilege 2384 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe 2384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2384 wrote to memory of 2968 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2968 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2968 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2820 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2952 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2952 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2952 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe PID 2384 wrote to memory of 2920 2384 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1Ys8-viej1i1Qz81w1qsG0xie3BJjWRAA/view?usp=drive_link1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c79758,0x7fef6c79768,0x7fef6c797782⤵PID:2968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1336,i,6399842088480864928,11236056065710360247,131072 /prefetch:22⤵PID:2820
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=992 --field-trial-handle=1336,i,6399842088480864928,11236056065710360247,131072 /prefetch:82⤵PID:2920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1476 --field-trial-handle=1336,i,6399842088480864928,11236056065710360247,131072 /prefetch:82⤵PID:2952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1336,i,6399842088480864928,11236056065710360247,131072 /prefetch:12⤵PID:3060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1336,i,6399842088480864928,11236056065710360247,131072 /prefetch:12⤵PID:2416
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2368 --field-trial-handle=1336,i,6399842088480864928,11236056065710360247,131072 /prefetch:22⤵PID:1096
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1316 --field-trial-handle=1336,i,6399842088480864928,11236056065710360247,131072 /prefetch:12⤵PID:2324
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3788 --field-trial-handle=1336,i,6399842088480864928,11236056065710360247,131072 /prefetch:82⤵PID:688
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD58e726f705237de526d24bef1bf3a0631
SHA132686afb7c33d0ea65c413d773bdff6a01a59899
SHA256b0caf825c0456cc2e5ffef6801f361e34d5533c3bf55e3af0cb983e39343ba14
SHA512c62c7e9ee6d1c5408811099f5bd5dde0ea20dd5d9d85deec980b3bab8344eefcd55143eda98b995d2418ca20522420f0d2d6c8f18bc0ecb48ad32b4a5e2e8c9c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD5818d4bf6c4e97fc0f685901dd042d419
SHA1a533a3be3d321bdb9ddb62d1d91e5e27e49f8cf9
SHA25640f0b191ee8301dd5c80b4972f88f5668f4dac1d324306cc833d023ca5d62b9a
SHA51295c8469d541bc84122baa7c9d3513b4230d1ba1a6b5c450bccb85c377746571ca3c2634f23db0f7f5bb5c6732291856834835f44c0c996d43114f1db5f355a5f
-
Filesize
4KB
MD5585b5278ac6a3dbcd6ffa9ecc43cbe24
SHA11367ed671ee4e23ee56f16f6883c60c1cb779b00
SHA25649952888146c7b84c70f7912c3d990ead7f29d49c32ca0281742a9182af145f2
SHA512115c9bffda8460058637ee788afc5e8f85994b5c2bf9e0a4dd4142cc9913a2b479e5b729dabc0484f3bc717f94686041ea82a91b558f2e6622297e16c488d966
-
Filesize
4KB
MD5267b578650a40c2aed60aab4a8f250f6
SHA1dde990ee2fc674d86ca67e31d165bf9223c96ab2
SHA256c2b45109a6992b490ae293764dcf3a2ec461161d3902dff3569fbb9564163148
SHA512e24e57b0a38fbfd9a02a69d1a716c7022c66696573caff8a822c9766e8b0be1bccec99b7f98dc98f92431d31a3dbfcb4deb9729c18eefc9c3c5439055a7d8e6e
-
Filesize
5KB
MD561af9127756ad8691bd6878ea16378c8
SHA1079239ca8183a52c73d614e1ad8368c0fad70995
SHA256460d0c4b6cd7a5d9bd75265917e2f0e6738e5bad2c66a71e7fb94355ad27355c
SHA5122848f5faae5d85452ae82a46b4a0797c880c7d1111a8985dec187d5987359afb99a94bcc79e063e5620cb73529c9f5bd27455d63a8eed110066b02489c3e9889
-
Filesize
5KB
MD53e5739dd5bfb80ed23fbafcb4f25eeb1
SHA1d9b0111a2ee196cdb23d51416421d55f461fe893
SHA2566ef5f1daaa75a9c8249f44983a1257159f33f90bc83a5e84a9ae570ded21ebac
SHA5128e90f68e2bc70c9b57fea51511e27979487441795cf6e82170b3da35dd9ac13ba2cf578a627b689a5dc9bd11acb44651cdd21541a4980c9950f87b729638bb82
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e