Analysis
-
max time kernel
74s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 15:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1d6hCcmMtyl3OW_1_eGYtAyLEt0jMzkET/view?usp=drive_link
Resource
win10v2004-20240419-en
General
-
Target
https://drive.google.com/file/d/1d6hCcmMtyl3OW_1_eGYtAyLEt0jMzkET/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 27 drive.google.com 4 drive.google.com 12 drive.google.com 19 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133586192098659849" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4488 chrome.exe 4488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe Token: SeShutdownPrivilege 4488 chrome.exe Token: SeCreatePagefilePrivilege 4488 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe 4488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4488 wrote to memory of 1732 4488 chrome.exe 83 PID 4488 wrote to memory of 1732 4488 chrome.exe 83 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 1588 4488 chrome.exe 84 PID 4488 wrote to memory of 2856 4488 chrome.exe 85 PID 4488 wrote to memory of 2856 4488 chrome.exe 85 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86 PID 4488 wrote to memory of 2000 4488 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1d6hCcmMtyl3OW_1_eGYtAyLEt0jMzkET/view?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff368ccc40,0x7fff368ccc4c,0x7fff368ccc582⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1864,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4592,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=5080,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4620,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5104,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3288,i,12850645838886262836,7193378712610859350,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:1844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5d8575809ebb3d56f21a53d7e8251be91
SHA19643717c38a058b80fff463d8689859622b8fb5b
SHA2561e01032eed923e88b688f376cf4a21c8d52f18c4cf7002e90e1808fe3badd50a
SHA5121b9a590686e22c57068a92eda525d407349098077ba80a003e8c58ebc0e2907236271d27cf5f07fe30002003076bc4bdd6fecbb410a757eb8355e290b23ae935
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5eb221a8e63252b8d8de29a931ab8dd5e
SHA15ca7d4c879d1a080f6bf44c99c48be9a6194dcfd
SHA256bfadc58973d533a64b864e44b8925149dc6085c59e749aff97837385e8e5b6b3
SHA512b7b6277b8b9f0bc748358d8fae4426a98efc20ed4599c6fb72edcde7172fc926aa6fd072ffd2bb45a8ad0f522ca0f00b2e313386d05becdaa46ed48fad4331ae
-
Filesize
8KB
MD5e661ffd87e2561f0539af7a1ffa435e1
SHA147698e5ef0aba544ebe9ee342f0024a80d2db81a
SHA2562377be57c1879bfddd895710846b218df42b7037207faebe237a9b715995b254
SHA51249d45fbb1114b55d3a3cf095184a314d7e06f6ab12ca56d9d90c70cbb08782bde2137f9972f333ee0a73e9321074ac61d293adc6a4e806fd5f1b5a42988f6965
-
Filesize
9KB
MD5bacd390a9756513dda34c33fd2696192
SHA1e386004c8a67a5eda8fce8703b130e0bab6766ef
SHA25669740a909938b8cb9892173d9f279d399915eac7284fbe55fea0eaffaef56e09
SHA5126a381e7997cdcfa81d9d4b2034ec7c357540e2c81d236e270d8439f36775185ee6f4cbbb28557f8c64c68228552b1662bb339ad060f4c0d188c50a9c2df988c7
-
Filesize
9KB
MD507ebeee583eec16c5caf5b4b7d19ae62
SHA117d25b3716498bca7faf165cf8e3bab8c2037e53
SHA2568fdc34ebe7c99551a587d7a8ce8e3a5d8f8e8a8e1d7c6ddcb1acd1951cffb708
SHA5126bb4e68b1bc12a9189213975473611bfa1a0a090df73cd29acf0563c28a6f273621e7020d46ecf02ba8befab107cc271add29db1ea4865660485c052b4d2cf17
-
Filesize
9KB
MD548d74d007e8c7efd05d3957a643428e9
SHA1d98a563939c31f49512a79f5af524c991c5a6f72
SHA256d318ec5b868dfbc18fb14cfd058e3c14b44419ad4cd92d8c9db5ec3c559bd1c1
SHA5129e61b117804e236cce879d0fd3c83e1fb19f1a11a1eb96b7bc1ad37349710a57c4822474ccbc88311116ead40ddebdb9165ce13a8104f341119f9bd1573cd593
-
Filesize
77KB
MD57f1ee8bf6de7a2f468a2dd6ad4a36ae7
SHA1944b17dfd3f0a0672882bb61bda792b136a0aec8
SHA256636e14af3ac59a7ca67dfadbfead3e9fd526e47db5049ece3f2e4a8e018f751f
SHA512bab8e760ff8a9c5262f2161599b9072eb01f822d0fa5f65593565f427c3775c2ed55c1d45a73642e1f0fb35fb7c3164f5cd5febc0682d6f32ec50e6f087dc99f
-
Filesize
77KB
MD5646b43f43d486b997b739ad8c95d8328
SHA18a2805439f20c550ee5a3f5b9520695d17d15632
SHA256a5d72ceb8b15021ce58c6844b7add996e70556c1d0989bcd354ab9bfa27d8253
SHA512022f2326c46bc7c49f421b1157e3fbd3f91dd65538a3b50bbc641a42bed48c0c1c9484f3c4cccc91df80a6ed8c893f696791c24091e3b4be5121c4ba814e4581