Analysis
-
max time kernel
12s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 19:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/10VawQdaB9Yx7LFqCPIYsQuyG2cTAT0X9/view?usp=drivesdk
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/10VawQdaB9Yx7LFqCPIYsQuyG2cTAT0X9/view?usp=drivesdk
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 drive.google.com 2 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133675330054875577" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3128 1920 chrome.exe 83 PID 1920 wrote to memory of 3128 1920 chrome.exe 83 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3380 1920 chrome.exe 84 PID 1920 wrote to memory of 3396 1920 chrome.exe 85 PID 1920 wrote to memory of 3396 1920 chrome.exe 85 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86 PID 1920 wrote to memory of 4800 1920 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/10VawQdaB9Yx7LFqCPIYsQuyG2cTAT0X9/view?usp=drivesdk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffce219cc40,0x7ffce219cc4c,0x7ffce219cc582⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1856,i,11504498831302510906,6426803213376129311,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1852 /prefetch:22⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,11504498831302510906,6426803213376129311,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2220,i,11504498831302510906,6426803213376129311,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,11504498831302510906,6426803213376129311,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,11504498831302510906,6426803213376129311,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3672,i,11504498831302510906,6426803213376129311,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,11504498831302510906,6426803213376129311,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5804921b3423202f7ebdcab4b39300a43
SHA17337907100ffbcc92c631b135ddb2df4e13863fb
SHA256bee37a2c5b6ac2bd9123502cf7220147d02c5ddb7baf9fe51a337d67ce7bc030
SHA512b06f1700b080aa19fc2f76377e5d988ce6f7a8981c915d9c2b81e76f5953c7830d5715d83a5ba6f15431cc97fca00d7158ed7815d1bd3f8ce488c6d211b96245
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD56b20c42fbefe6678ce142aba08b4b482
SHA16cedfd4ca1c126d964f6a91d7b8db052aca0126c
SHA256a5ac022e3b1927329c00ce5b56c0628b4f2469423fc5719481a7f2ed79554b04
SHA512fb3ce0fedf6088d41ed15591bf49b93e85b9f3c821b2ced662ed33498806bde55cbc2adc8bd5f0aa6b18b624e39d15ad9f88f6c9f5e6b7a76bbe0bc62e21849f
-
Filesize
8KB
MD5de5a310886b2f12d4ade91b44c2dfee4
SHA187a0897aa372618382ce49b82fbb5273c51f99fb
SHA2567888773b22b95f82210cc6cdbbcf1309deb926751350802442eeebfe1504bbd8
SHA51251112078ffc10e06c5aff89a3b998621e6595998122b2277fc80f8d56c807003dbebbd9b946e646d23c415a0c1505da1456f160abd87f137bb80474aa8689f52
-
Filesize
99KB
MD5eca7f365b1ef2c25e7d0c62d798224d4
SHA170e76e135771877305066e98359a66fe5bbcd8bb
SHA256fc8aa7cc180425d9d7c143004b06075c270ec3b36b97dbe19eaa129bf8f3cc21
SHA512a4ef777beca76f258ebe3e20f634b0c892a7f07b4fe1bf929148c620e67225731ed6dd26467522f004f22a7f83b59f3abb5b35095fe6a96e071e2ea48f48edc2