Analysis
-
max time kernel
59s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
26-07-2024 10:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/10jAT_RVLaYuF4pZ8BYYMVRgqvmmmpdJj/view?usp=drivesdk
Resource
win10-20240611-en
General
-
Target
https://drive.google.com/file/d/10jAT_RVLaYuF4pZ8BYYMVRgqvmmmpdJj/view?usp=drivesdk
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 2 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133664634468000581" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3964 chrome.exe 3964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe Token: SeShutdownPrivilege 3964 chrome.exe Token: SeCreatePagefilePrivilege 3964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe 3964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 3824 3964 chrome.exe 70 PID 3964 wrote to memory of 3824 3964 chrome.exe 70 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 3524 3964 chrome.exe 72 PID 3964 wrote to memory of 2172 3964 chrome.exe 73 PID 3964 wrote to memory of 2172 3964 chrome.exe 73 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74 PID 3964 wrote to memory of 4688 3964 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/10jAT_RVLaYuF4pZ8BYYMVRgqvmmmpdJj/view?usp=drivesdk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9177a9758,0x7ff9177a9768,0x7ff9177a97782⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:22⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:82⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2116 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:82⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2952 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:12⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4620 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:12⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3800 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3692 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 --field-trial-handle=1940,i,113701837872027650,14258660355474050394,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD50cfd2f953d75e29221bf684c33e30c9a
SHA113954516dd271190d20b8381f877d7a028f2ce66
SHA256df7bc5e7ea715a80bbf0f538ff6ae4487d5e526804aa59b8ba1e8be67137261d
SHA512804b57ef1013862ff81e67194ef2b140ffe33caad9055d18190325c754af22f2e7716560f6801eb2df76e2c2c6816a72faf73aa4fbdd834cbd03228758dd388c
-
Filesize
1KB
MD5b66c2e4770c6eda2b27283b743d74b83
SHA1a3a403b3a716f0f8a86e83e50aed24f9b8b71baf
SHA2562b5fc8c6d750c4413e3ce4f0c61280d534378f9048141f1afd8f0b43212ccfac
SHA5123eeecb78ddd3284e7c5564a37d8f45cae176f0479311cd78c99f6e025cce66c666dc9d76b72aa5d96d28b826d934fd4a94f7434b81ad138b0be8561410cef547
-
Filesize
5KB
MD5b6e34948aa8b92096aec15659132978d
SHA1bd7c12634d29fb17c5d6864a611607adb0dc18ad
SHA2560dffd01ddd3bf97eac23787f22a4565ec1a6b71b28557ce0db4e1d4cf9fdd064
SHA512e55bad12be6a276efee60493a15856afa0cd3cd9f222d7ba9a96a2e40afead85665aa78b434163e8f9db2feac345c1b2408f8692375c91fd1f6a73ad7defc5e8
-
Filesize
5KB
MD531e343113ff31e5bea6a8549d829ad61
SHA1717c255a2e8025b4765c4b403da8aeefaa213de3
SHA2564cab93e88e8bff3aeb3e126fc825a148e2ff78a20c351c6eec6797d895b1ad4c
SHA512dc1d71920e824e05e8d11bf5504251f53c4c7f266b4fa1c830fdc8f6d2fc59d4a76857142c134db67180f439af7890c19f35e80ff70cd6bfefc157941117473b
-
Filesize
150KB
MD56e4a009221ad6a890aa0a4b84e0d33de
SHA1c03047b86813d2b1d694341809217114e24a4410
SHA25686e28012759d2b7a7cdbfdb5a84c47974fba55a5792a9b1258f8b5247b89d668
SHA512721395678b11ff9f295c67b7a4009d59937691e5deefc6d778ffe64573e21ec2e7d28263b9619499bdfb3178042b3c14079c391f95904f7c90c7b353ae19b9e4
-
Filesize
150KB
MD590b612dfeda1a4a84425ca0b44823686
SHA1de0b9fe44a5b9e2890ac357f7a0a20fb388e5751
SHA2560cb3f78d64b59c553425ae2d014ce8331a870ce9268496fa7dd4ac5870d22d1e
SHA512a2e5b73d9fc9f8eaea0975d00117d69bb50aa1e4ba4ebe5073885ab6870235a4d1fbd2f4e21c2df49800b74f7404f533225c7be314c326a6af2a6648e301a1b0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd