Analysis
-
max time kernel
1799s -
max time network
1735s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 12:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/16MwbENvB3elvioZTAxL9nhwq3TuAOKqn/view
Resource
win10v2004-20240226-en
General
-
Target
https://drive.google.com/file/d/16MwbENvB3elvioZTAxL9nhwq3TuAOKqn/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 drive.google.com 14 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133545470794704768" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 948 chrome.exe 948 chrome.exe 1260 chrome.exe 1260 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 948 chrome.exe 948 chrome.exe 948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe Token: SeShutdownPrivilege 948 chrome.exe Token: SeCreatePagefilePrivilege 948 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe 948 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 948 wrote to memory of 552 948 chrome.exe 87 PID 948 wrote to memory of 552 948 chrome.exe 87 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 3256 948 chrome.exe 90 PID 948 wrote to memory of 1276 948 chrome.exe 91 PID 948 wrote to memory of 1276 948 chrome.exe 91 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92 PID 948 wrote to memory of 1164 948 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/16MwbENvB3elvioZTAxL9nhwq3TuAOKqn/view1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7fdb9758,0x7ffa7fdb9768,0x7ffa7fdb97782⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:22⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:82⤵PID:1276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2892 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:12⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4824 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5160 --field-trial-handle=1876,i,12902016035864239603,10493918440251093618,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4676
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:3240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD576200f4ca4323dc7379044c1f9e2a7cb
SHA18d461a8c8265102da847c6df6d5f5cb6cdf8129a
SHA25628f3bc705b2303c7697c461f0094f4f9b50981c9556db6eced409606cb836dc1
SHA512edc4b35f15f00ed2d6a7bece01ab68e59f030e7f7172311c65c7de63166593196cbf060ad3eeece34c2a04c1110b4c8ef866c18c0bb94ee9b969c564d771f227
-
Filesize
4KB
MD590194bc4dba2c2a3175248614d7850c5
SHA102a586b043888b239a9933b643d335ea6253d333
SHA256fc74e32c0ff00a67fc555ae8baecf44531247005a6eb24d4f5d8ddb9a5116969
SHA51263a47a813c6da31b0f578783c169bc6867b3ba48e9dc9184b40c51bab8a31647be91abf11e6e0ccdb52b96a4eddb2f3f4aa74a9a68623d14cd92f9776ad7c7f5
-
Filesize
4KB
MD5fc9e4cc35d8a5c8180f6a627a2bf0858
SHA1d41945e7e3b2ec9ddc53bf6e6c44d958979cdc84
SHA256a5d73726b8f5b84279919cd1940afb7c366b187308ca9149ee84ea649bf66344
SHA5126be1615a0d61f7c9b7bb1c36760466040f0fe7e00d6a73e9842fe73e6b3a8ab61ef725aebb99dd0a7d69d03c34068095db016cc4ac2af9e911260919bf725745
-
Filesize
1KB
MD5e252bb27f00d5a17ba7ed5d441441070
SHA18cb75a3a061266735c9425bb66cb3b2bd22fb334
SHA25662500bf2af427c5f46f1cef877c47dd9fcc284cba624e373f9ffdc1233314194
SHA5129def36120c659ab4ceac29323cafcb2a52c9b052db9588e8cb08f2dff8566ee552a202dda89483788d6275bb0298ead5573be2fd46c0572342b820771fba7281
-
Filesize
4KB
MD557d46178d5565857335924cc75a1a092
SHA10464ba329aee58c45b19107f2194870b364c4aa4
SHA256efed51ddd2db36ec7f050feb41c2e5e5738a565d8e7e0b7ba5aeec1dd4c3f2b9
SHA512586647960d4b00d75c69be166035e2726a4805f5521b9edaf8b03bf0aafdd3607f675daaecbe98a6ecbbc614b3bd78a90792c40e24828ea06bd7f6702b76c956
-
Filesize
4KB
MD586a55c069ef850c52c4cb60573932cd7
SHA1de9c5aa3455e0d0c62207479bd0df0b5b4702a93
SHA2560e781ecb9e7a0d826e8f78b74be08ba5de8b6f793726602784bc843b75fe26e5
SHA51274df0e1c28af328993e59613b61b9439401ac99a577a4562c70dd8afd8f0eca44ed6cd91b4d5de779a820101ce33ff7061bc85ef868ba4ce30c6dcde4f65dfbe
-
Filesize
4KB
MD5a5fe59906cb5ae989bf864e945893a2b
SHA1b50cfa2532413ed2876cbaa8a33b7589c2c2c2c3
SHA2561b7127543cbeb103eade861369abad948a6f76302cc1c07b50e0b6b0a70dff48
SHA512e79a46be5076b6c576196697ad8848352992f1bce340be0535932e609679424ab22ca111b8c490c0fd310b3d70a83218828ca8b85df9515163358acafbaf7bf8
-
Filesize
3KB
MD5e6ccccade290fd49e76f97c396f294b6
SHA1c35edeace838789c25b0e5e49af0e5afd5aeff15
SHA2567464fdfc504c149d84daf77a89832d2f83626e614779904524615ba3b1889037
SHA512f1a1c481ffb0ed601737d6a429e59eff6dbd81d5a48c059476341c8ce6ee397ec96a11f1dfed74b4cb71078afbabefe8457852ab1cfc4ee8496146f90720bb02
-
Filesize
1KB
MD532eedd0a57a0c592b13a5aee53c6ae38
SHA1a1d5f1bac16d6a1579acafb125475f382758f058
SHA256cea3c4bfa2119ed209d4f62e27cd2784ec13da4ed9b2b397bb131c1e084bf5ba
SHA5120b1d1794d1c722e7b1c2db203d1bbfb0ef21a997d31a5aa0eb4a7290c12ef4db0a7fd20151cec641e1a50798e6fcd45362594a5c0cda7a42c891ff8f512be971
-
Filesize
6KB
MD5a1464b7b6c56bfc8685e282cc4dd5bbd
SHA1e317a03e8503392e9bf51c918b584f093d53d0cf
SHA2566169a14a1b29eda9f59fcadf64430fdaea377f5efe0ba33ebb1d19a35b22efb3
SHA51210ec7d19e256b5dd28b971e7e8f4063d0a25adc29a86d61fda4dbf606b3f04099fbd0fc1d49973fc10d7c0dbbd737e02af83dcdc663c1e0a5e3d6828d3b28e24
-
Filesize
128KB
MD55ed1844237a3759e31e7ce246009be96
SHA10cb7c21e016ff6c1ee54c083fbadf8200acc6648
SHA256f8ed9a11a1906e4b4b9af03b82f2ee3ffd212840fa0bcba00717e152b19dae81
SHA51217e66737a82e13d15a66ac07903eb34b7003bfb91c32dca7104b4c464a4f52d240aade53b9a83f171b813a88c29b53347505a69f9a3de6fdc5fc952377d00ada
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd