Analysis
-
max time kernel
21s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 16:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1JfZ8xkkQD_3TZ5uUlquo0d3fjUPH20Xn?usp=sharing_esl&
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/folders/1JfZ8xkkQD_3TZ5uUlquo0d3fjUPH20Xn?usp=sharing_esl&
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 4 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133676069639995532" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{5E95CB19-1C53-4E25-9B34-7363D4C6B39F} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3648 chrome.exe 3648 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe Token: SeShutdownPrivilege 3648 chrome.exe Token: SeCreatePagefilePrivilege 3648 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe 3648 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3648 wrote to memory of 4828 3648 chrome.exe 84 PID 3648 wrote to memory of 4828 3648 chrome.exe 84 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 3704 3648 chrome.exe 86 PID 3648 wrote to memory of 2420 3648 chrome.exe 87 PID 3648 wrote to memory of 2420 3648 chrome.exe 87 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88 PID 3648 wrote to memory of 1660 3648 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1JfZ8xkkQD_3TZ5uUlquo0d3fjUPH20Xn?usp=sharing_esl&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa67fccc40,0x7ffa67fccc4c,0x7ffa67fccc582⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1588,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1928 /prefetch:32⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2444 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3660,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4656,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4660,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4684 /prefetch:82⤵
- Modifies registry class
PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5048,i,17144233952968436612,7200646398584435208,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5fbacd313e85e1a741488c5beff29226d
SHA1bd0d6fe0767c5914e12e075e7635694ef8f0422d
SHA2568e3f32c552d9fa3f4fc6d1a4111a5f779b3a5e5576c2eafadc1ca8c896fe6dd2
SHA5129844ec21f7ee7b37969d0d6d30b4205e453572416f12df0fa112a8ba5bd75cae1d9faca0a6b3abcfb87aef1e07706b509562f7b9dc69613a1b699fe2c92f4d58
-
Filesize
8KB
MD5a031d63391aa050a6df98fcc65ac4ccd
SHA1c47da98a0d4c49d0b93886ef9a26da087365fe6e
SHA256e789fbe06af5b07c43b44358f6bfd8f03446c41af4430f6b154a520d4e759361
SHA5120a043046f23cee467e7d59dc70a41796c4df432ad0d8197b595e41459eb51e459a55732731aa05140d25be9ca4e3dd70fc864429badb753dfd91fdc86116271d
-
Filesize
99KB
MD5fcf256df8ea9e5c5e36f2d3af381e51f
SHA1ab5963385af9af9e2cbe92aa040b6c140a3bce8b
SHA25660afbbc2801f3b8ad3caf2aa8e227c8332bfe6bec30d3cddcd780196d8faa59c
SHA51230ec213bd314789864e550b139bcb3d93dccff3e999cd9ead6e320b19dc8ec1e243b4165330ea3db0b1eb43a50357d958106bbb92cf2edfc2a7363a1ddaf871c