Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-02-2024 16:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/164ahlDSiSj8AwkMjKyLa3ecjQFpXrLgA/view?usp=drive_web
Resource
win11-20240214-en
General
-
Target
https://drive.google.com/file/d/164ahlDSiSj8AwkMjKyLa3ecjQFpXrLgA/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529184980365720" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3424 wrote to memory of 2344 3424 chrome.exe 77 PID 3424 wrote to memory of 2344 3424 chrome.exe 77 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3852 3424 chrome.exe 79 PID 3424 wrote to memory of 3728 3424 chrome.exe 80 PID 3424 wrote to memory of 3728 3424 chrome.exe 80 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81 PID 3424 wrote to memory of 1772 3424 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/164ahlDSiSj8AwkMjKyLa3ecjQFpXrLgA/view?usp=drive_web1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8729c9758,0x7ff8729c9768,0x7ff8729c97782⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1904,i,2012588999685809223,11677961201254820522,131072 /prefetch:22⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1920 --field-trial-handle=1904,i,2012588999685809223,11677961201254820522,131072 /prefetch:82⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1904,i,2012588999685809223,11677961201254820522,131072 /prefetch:82⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1904,i,2012588999685809223,11677961201254820522,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1904,i,2012588999685809223,11677961201254820522,131072 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1904,i,2012588999685809223,11677961201254820522,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1904,i,2012588999685809223,11677961201254820522,131072 /prefetch:82⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1904,i,2012588999685809223,11677961201254820522,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e45c96f4264fdefa7770e9ca0269aa08
SHA199d4785827350b8561c44394619856f28f4670a1
SHA2564a4a32c9a4a28d496e2d9cc64a6861836dfd25f34dcd543a5bd1596fcf285e6c
SHA512d98d8522649ba39469efbbcb04be9656e762ed46534ce5eb5387146120bd6e5638f80ce03bdf9775909434df0be01d6d96d17fd9bd103582d75c84d7b79ec94b
-
Filesize
6KB
MD5d012925be65a3de3e4b1688a7bdfba9f
SHA16754fbd8bf7b90a73baea8453371de596af14e93
SHA2569e5c0439475e0c6caf995ac4f0aab840bb35b50a0fc79d0e5d9502ac14eaca4d
SHA51276130c838db432f021479a7aa49a8a2aae810208d9aa1a1eade352711c9d6ee9f19687acb62c3d33a5dd4abd5f427dd6d83761ff4ba9c523e3fa89bb2292911c
-
Filesize
129KB
MD5d07ddabab7509c2c5b21dbc19fd6a728
SHA1ea20e2425b72f660655e7a240740a442f65e0d10
SHA25659aefe64a6a1e1ccec13aeea7151f40b421ad39872b840547cbac71104250ad8
SHA512f40e60e32c480924b0eb3784b7fd4218731c669ee6ea6c190806d8f260a0dc7fdd0cede8b83cc5b94d9a1935eb6acea5c4fd0f8364261c5b025f7768d5b8fb04
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd