Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 15:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1NlURxskPuEJE-4B5Wjji21hD0AxL60cx?usp=drive_link
Resource
win10v2004-20240426-en
General
-
Target
https://drive.google.com/drive/folders/1NlURxskPuEJE-4B5Wjji21hD0AxL60cx?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1140 chrome.exe 1140 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 1140 chrome.exe 1140 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe Token: SeShutdownPrivilege 1140 chrome.exe Token: SeCreatePagefilePrivilege 1140 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe 1140 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1140 wrote to memory of 3544 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 3544 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4696 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 2112 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 2112 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe PID 1140 wrote to memory of 4528 1140 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1NlURxskPuEJE-4B5Wjji21hD0AxL60cx?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffaf02ab58,0x7fffaf02ab68,0x7fffaf02ab782⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 --field-trial-handle=1896,i,10216653358407461558,8866342334095923387,131072 /prefetch:22⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,10216653358407461558,8866342334095923387,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1896,i,10216653358407461558,8866342334095923387,131072 /prefetch:82⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1896,i,10216653358407461558,8866342334095923387,131072 /prefetch:12⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1896,i,10216653358407461558,8866342334095923387,131072 /prefetch:12⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1896,i,10216653358407461558,8866342334095923387,131072 /prefetch:82⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 --field-trial-handle=1896,i,10216653358407461558,8866342334095923387,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\865d39cc-9ade-4d0b-ae67-8fe828ba85c0.tmp
Filesize6KB
MD50e34f7a932952fe502a656947397535b
SHA138ec24e122614c30e13a9fb7c515f94d54b37c5b
SHA2567ba3b3ed12e02b5b1c684270c37fa184d7d46f651776e6ef83c9878326303e4e
SHA512db3694a0eca942b51bd1938f888ffc726ce35ca264cbeb4aa6663caeb13b1b12a83688c23beb4d837f2130746d9a2383449f372bd5045d5d15dca2b59cb95238
-
Filesize
27KB
MD54b419751b95602190e663dcfb4397186
SHA1584625bb902af71e0d551a72995cce18736bf738
SHA256566e5021669d6f9d13f9af0fc133ffdb0d2f7b5ad5698aecbbfe1de1c9751ba2
SHA51260d3976779651bf7652fe6e5e9bf2ed251439ee04a891d3dd5112cac2b7ae6b70cd7cc7a49cf2b71931a3308ebdf945a5254d60a6789ebbbcc749ea2742d0eeb
-
Filesize
1KB
MD5af91da499af2c5a1852e29849af4ac0c
SHA199539e4b19e761a49bf1749490fb2730c89bceff
SHA256b455b1579dea6b78a84a0691e370385200c322254dd277b94d4c4ee46fb6fb82
SHA512f791a78871ac8bed9a2768f24c353cb9002bc386bc540072580d33936f160070bf2700a250f838888391dc99a947abb77533479b17e4c49c7b1be5481282e0c5
-
Filesize
264KB
MD57ffb59aef216377c74ddd6dfdcef2600
SHA1e2adc4fd884dd4bfadb920777558bc15005136cd
SHA2560b78a74b70b3176059e7bba3c50cab94bb065400161fe2cde8cff4078e3156da
SHA5122d6d623934882289a646dee513806ca572d69f3cf6349a92551fd1ffa4b8d429b691e6a0900d3ef0652e0988f0257f0157894fb9921884c527408e760ce568de
-
Filesize
4KB
MD5d98829f375bd643d7a2069873e79ffe5
SHA13e91a08218f18c5574e2cec0806dbf1a1404b72e
SHA256297ee5b736fc53f5c2e868af0557f09728b23b169627eff11f5fb90ba00b24f6
SHA5126e79c8ac92947d117344cb944605ebf663edad353e616073414ae51ed92a417759e444eb476373b7948d120c94dae2802d6e9c9abe06801deecd41d84fa91558
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59a3a0aba68f220aec89a4c5ec5cd7e31
SHA1f03c424f57faa01503783d0d1642d86c91ce87b2
SHA256ade21cf0f6c5d1be5bf60bfcb25c138a93c7d2f2b64ae750ab21938604ab1e95
SHA5126fb77849b384a30c36d3177b0aae606f1c7e27609cda36573701a4e1743f84d0c410a1e60f8419929053a7f70b2cfdf7f824ba09f93d806a2435a6d3f6d09b36
-
Filesize
1KB
MD58bb9800b2c3678cdbac92dfcf25aa765
SHA10b488e85ccb3a099cf982663b74ae06f8da6f160
SHA256bf581d48a6ef86277cb5f9a922e97e7405999ebfe2ec4e8aabbe4c81bfa0231e
SHA512a3f1e53393daf91142182b59e37d999a414f8894e45e73b5996254009deb75c01e66f5548fcfca9c2326d2b20cf7feff1d98bc8cc2eb2f1d65930f14f43e9865
-
Filesize
7KB
MD55fb360ffc15d2495cfd7957b1c2a5af9
SHA146437e6a70ffb4556f51bcae3962646c12e7a2bc
SHA256e94317bd42aa5e512505dc903ea8f2c0d1360ee7615f50f6640e13d03b8e2eb3
SHA5128ec349e9f75dcf6afb31b3e9a4b943f2d6669448728d2cfc4a78c1b0ebdad71bb4fd91793bf6e1a1d313bf26545d28b8142087cb48e4a6b627279a6d976a1774
-
Filesize
130KB
MD57b7dbe74058c091838d763102a164383
SHA10bb9f1fda534906a1d67740ef7b85f6fcc3a123b
SHA256635d6bda6ba0a73c0076e44b5d08d8a1b93eea9a216b64ad0bc6e2c14a8bff9a
SHA51233d62e2b0f74ad63cc48f3fca5b15adfe3224559dafd26d454ea0ad85f9f6f77cd0c55e112c0504352d264b514f90f439cb47d8f7fd43c39f51ce2f4f0076005
-
Filesize
130KB
MD5798a754e8a0cf0da5454bb93df4a278a
SHA115f6513085df3846bb40b9db5452c8593e00d728
SHA256c0c5dc13dc7941b031b4ef7869101dfc93e9ca33321a2cd0c5ead232577ffda5
SHA512f398be7ff182a826d143645718f54593b24a7c8960059c73c75592bf6da99fd2122254e5aae89ee1ef1c3462c75cb377c7b575af012ddec39a0cad9fe3031afe
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e