Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 17:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/134sStcfDjUCuSQMC6Qn_coBErLWyRyIz/view?usp=drive_web
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/134sStcfDjUCuSQMC6Qn_coBErLWyRyIz/view?usp=drive_web
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 2 drive.google.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133672657771534492" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe 1296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe Token: SeShutdownPrivilege 4612 chrome.exe Token: SeCreatePagefilePrivilege 4612 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe 4612 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2468 4612 chrome.exe 86 PID 4612 wrote to memory of 2468 4612 chrome.exe 86 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2848 4612 chrome.exe 87 PID 4612 wrote to memory of 2100 4612 chrome.exe 88 PID 4612 wrote to memory of 2100 4612 chrome.exe 88 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89 PID 4612 wrote to memory of 1808 4612 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/134sStcfDjUCuSQMC6Qn_coBErLWyRyIz/view?usp=drive_web1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5ac3cc40,0x7fff5ac3cc4c,0x7fff5ac3cc582⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,12374182062936394027,4919294387849347795,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,12374182062936394027,4919294387849347795,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,12374182062936394027,4919294387849347795,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,12374182062936394027,4919294387849347795,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,12374182062936394027,4919294387849347795,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,12374182062936394027,4919294387849347795,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4592,i,12374182062936394027,4919294387849347795,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5b3f09fe2d74708c8b3232a44ed2011bb
SHA1cdf4249c1be6441323c8fb5c4f1abeef326afb7c
SHA256dc5ed9e7b6d8b6f4237d02404dfb1d316ead16ad18cd6e41b57312591301e9d9
SHA51245b06f33ddcd0409abb745d00028d033b31c34698c54716aca2c46cdf9ac32c29c82a17d066c86a8508ad441efa1dc5b96a73ff057ae496af29b9c0d25cbaecb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5d7b6899f501db2de2526c5dfacfad6f0
SHA14c2399c0583d49d93b0b6ef6ec7a209fbf967167
SHA25600e206209a9672e2d1da3c80071d7694a7984eefaf7cdd2a895611c27696f3ea
SHA512e9f0140a4e95feba2940e5584bc76d99290252a3c735ddb107a86a5d3984d632215f500fa5d778cfcc5e13b1bdc59007f182d5a7dd33ae1e294811f08a5ee6c4
-
Filesize
9KB
MD5f85a18582229f28059d41abb46b372b0
SHA12ff94f8ca091b78791547a55fd74e91ef34ecb65
SHA2569d95520d90061dedbbda9049cd54917542ba742be43c36dc52ddeac472a13cc7
SHA51207eb008ad859b2a7e1cc16a822950c9d4fca7c050d952a610520cd0e54f98c5926fd27b3ddc6798c4d0f69a3476446b8bc17968faa7bfdafeef883e5449c1cce
-
Filesize
8KB
MD5dc451066125159dd4e00ada363df92a5
SHA1e7a08925c7e467a9d7adcfc4bacb8597201f5de3
SHA25636ed8da570abd2c847357de171f624dec4fdcb072e3587cfd48e6414a9908491
SHA512237c3c29ee63de18ec9288f7c050adcb2b7a9bb619f1549c8b10ab392cc5bd8161ebf5289f005dafde6c713f12dd5efda67fa39d98e5f79aa846e74f26200d2a
-
Filesize
9KB
MD5e0c4ceaf6ba170cce10464ffd39668ec
SHA19473ba5829aae630ab1e0c852b232182bca3460b
SHA25624a521143ec0c20eaeb013c50c7c6b4014364a8ebb96efd997916271a97ddd17
SHA512aedfbf6abfdaa5a47dae069f222d88d9eedd4fab5cb7d22a258825a7427551c824b67eb829bb3f68faed96e3d5ddaf1484179f97ff624983dd45076e328ee612
-
Filesize
9KB
MD561cf29882c53ca8345e004cd940aab63
SHA104663a363b2e97dac1ee11a4173fbcea6d8e7cd5
SHA2569cad02ab75d43ec00ca88f10d8b99c4fb687aa67a1b445e30a347c3960c9e98b
SHA512bf436df275694480486211056d3c32203a70613f99a0ae0c94897c26ab0c07fb4ef6b908f8c51a4ae26185f2fcf8b9528e186156ea425674556f4f76a47b6bc4
-
Filesize
9KB
MD5d15bec8ea4a4b96dc34c529570cc051e
SHA1558ff69cd5d1444015c325872ed1086fcfe46a47
SHA256aa2d0891713aaa6965ded60a860b672f0c3b0171ded50a2eaf513dc141ff2a7d
SHA5121742536ba1b20c73fdd81b6ac5334a453fb0425162379ec7e545d09655b8efce63a9d4efb12ddd51f469d6bed7ceaffd30231ea03c0cbc48cd6b18ed822b0cb7
-
Filesize
8KB
MD54c5eabac8b89c1d74bd5c114bab1ed82
SHA1d752059c0dd13f4317426e6a5ff23a87a9978000
SHA256b1d4227f3586c30ca04d827bae5f7d4ba3360b6805b19099b19c2e430c68a802
SHA5128f8db35abd1c1a858c3b1ca0770b9413467746e7d30f6762ad0d4eee764febc9138c8f82b28f62fddf19335b0b6bb6dbb2b8e03572a8aab0d38b88910b9f61a7
-
Filesize
100KB
MD5df921b55ed711a79b61163e01888b5a9
SHA1990844a949cb4850a1d67ac90284cf614d9c00d4
SHA2566093bd539b93766cc7a70a3635e459a76a93e5fb04474696827b8bad013acb69
SHA512339de0702c0de3fddad11f574b8cffab976d42a4c35f752b6a09c30a8add14e7a995d377cd7f98b121f27927f13560625b2a27bff1802a45dffc55a643f70352
-
Filesize
100KB
MD59ff8457c2ba50fd0afb7fbd0dceb50d5
SHA1099dc9be1e0fceef041580fea3eec3dd0c4003ed
SHA256fd0f2efd10682eeb38667ba09a9b86c60585f625af3af14aec4e9277fcc5c10c
SHA5126a474185aab1fed7b342f6ee9605e1480354575add899e18cf856f383a7bcd7fb60051edc3dcc91cb63c81284ed77ecfc87c706b452260cfb0ff7c1b9d246d1f