Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 16:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1qjWn2Nz1JYpFeLEygW-gmWB5x5AYuLyY&export=download
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1qjWn2Nz1JYpFeLEygW-gmWB5x5AYuLyY&export=download
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 5 drive.google.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133676943504065033" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3584 chrome.exe 3584 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe 4532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3584 chrome.exe 3584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe Token: SeShutdownPrivilege 3584 chrome.exe Token: SeCreatePagefilePrivilege 3584 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe 3584 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3584 wrote to memory of 3044 3584 chrome.exe 84 PID 3584 wrote to memory of 3044 3584 chrome.exe 84 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 1292 3584 chrome.exe 85 PID 3584 wrote to memory of 2404 3584 chrome.exe 86 PID 3584 wrote to memory of 2404 3584 chrome.exe 86 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87 PID 3584 wrote to memory of 4256 3584 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1qjWn2Nz1JYpFeLEygW-gmWB5x5AYuLyY&export=download1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe15b7cc40,0x7ffe15b7cc4c,0x7ffe15b7cc582⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,11317869416224271317,3294088068626001066,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,11317869416224271317,3294088068626001066,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,11317869416224271317,3294088068626001066,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2344 /prefetch:82⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,11317869416224271317,3294088068626001066,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,11317869416224271317,3294088068626001066,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3772,i,11317869416224271317,3294088068626001066,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4904 /prefetch:82⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3832,i,11317869416224271317,3294088068626001066,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD581134497b6d6ca05b2a120ddfd069703
SHA117c79e4bdcf35a39438225c6437192a197e90457
SHA256a0d857807213cb7dd6d03db574d85d416d29c329bbeed41a0fa73525ddd53c16
SHA512e475922845450baf0abc5043eab2497941d04a01311c7b0863eab70107d102727d8c8a1f40ae4f57bf0edacd9c7394f66c48776bc0e27c873fad74ef32854ba3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD56ee869f3f6e48a653144cb0fdafa3ce5
SHA12946b693be08057082ea834f216a51e22d4c4528
SHA256dcb413d4b06cee429fc4122327622239a12557c37e6a1c3bcf46accab231f43c
SHA5121b45d118dbf0be5b98168b177e9ec5175384caca39c8be142f68d196a39d003834aa9a373f857d63cb6797b5917aec7a297fc58d9e06acc607010dbe90bd7dda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\c3290e25-292d-40e1-80df-fb05cf42db25.tmp
Filesize2KB
MD5478c7da9ca47a3e629ab06a62994278a
SHA1636ef15d53d17f3393091d7993c08e8c78cf7551
SHA2568a446f462716ae20200f10242024b67702e889086e35eecedd3882684f52e6ab
SHA512c363de6ffb93acf1588755da0bea0c4533ae630ba11bbcca04275ebc71e72e16909a3f2299001986be543624de9f2f3c91e656c7a135cfaabd6b4be8295e72ca
-
Filesize
9KB
MD5f96922c2cc7ba8eeabd7b8b5646451fd
SHA1950cfc64c27f241e4de66d5843bf0794126d6651
SHA256cc7bd1dd905470f0db139d976ef87cd9fd5929408998de557b8b1e83966b682f
SHA5129a01eb00e2485168ebdad5db0e8b0f2a2df28dcd23bc4eac35c3333846fe7a7f6bc97b54c466eb932211ec58af86862adb035fca87dca30cd4d167758e19dec0
-
Filesize
9KB
MD59cc08621850e25411dd786cdf1512821
SHA14a2c38fd18f64603c1acbea09607af0565a08279
SHA256ccadea8824f5f2629712a4be6a6cb01dc4d2dc42d901435ce04375e715090bee
SHA51278e62545a50b31fc7197ab7a38ea4b30f65e2d81535d156722a50d17ef2c97f3a238962a5f449d3a511ec2ec16151ed47b1f3ac3ebe52a8c869cf802a4ca3a0d
-
Filesize
9KB
MD586883eda801c87050c694ca570e0cd7b
SHA100776d52403b418ed9ed90d45788bd5c19535a9e
SHA256d88eaa4e22a4b7c11546e0fd13dcee309b80655f93e92b2b3005f5b5026a15c5
SHA512f6d0f4525f49652b3a1eeda24dc6468c2a580956f75637be4953424383ea2b26b63c5502a70bb28ec39ab47874e996c2f665135461ef413f913083467f2cfb3b
-
Filesize
9KB
MD5f9af923c1227e7f1ce45165a0635da50
SHA1c2944ef4146292f6c47936a091438eaf0f9659b6
SHA256796275784f816cd9ebfa6b0297d8acbc531ec2d881d1045b41323e84ec660e09
SHA51298bf2defdff24f39e2cb6ef1bc8f8d2593ca1596c46c5180ab41347a8717a6a6609017264bfb2f048c8071b5d84f89b230d5a254d03bf56bc045dab205b6ebb7
-
Filesize
9KB
MD59a83d24d4517eb12c85a0eec826719c9
SHA113bd7ddd0bd0228fcbd0d8cf3e5a47bb3d6fb10a
SHA256f2f8de598daa03edb07490a4ea7f77497badd7947ba5d684eba8d1fb1e797724
SHA5126163adff40f26379101004f85873d16b52e27a3e1bc2a796c76ea95f8ca10fcd934f95998615c8ac67348aafa774d66a9de93d92491a5a52d00fe3509280fd88
-
Filesize
9KB
MD5020de858acc8e50ba070612e6e95a115
SHA1a24fe4ff18534dfa29456ded01452a29649072ab
SHA256e30911e843e11fe6a976a4726b31c51bbeca067ce32edcbeae08753f43a4ce92
SHA512c16659999941b4da0c284196d6b3b4d2c8759d43a16655616253e6b93f004141981ff165ad79d46e5b38b2b99d69a636d0f90747302b4f7c96431471592152ac
-
Filesize
99KB
MD5ef1295042007ecc4ddd9db2c2fb546f3
SHA1a51ba0e188a51f96bc4672ed4190266819f3856f
SHA25619f066435a3d3315a83b0d29839c8177a8c7d1e6efc8759b655aadd671268bfb
SHA5125d5dc6b5697e586163ec8a343304930f21dcf0353b39ffcb29ea65323a54cd7675c2d32cbcd6f00c2471147b721072e0e6f5aec2ec33725b50bd063f84e9f13a
-
Filesize
99KB
MD5691472372786017a4ec9e89e1b1a79ba
SHA147b61d05141d473de492bf246ee48a4038d8de89
SHA2565c00145bf33709bc60a5046749eede172ca74a0571db4ffed5a1c24c6e0e4fef
SHA512d9e731fef1f9b7ddae6644f307ee19cd093180cd28eb4a2e07e6a1fcc4dc1a77a61eda6c1f969564919277e43857c7a39e56df3085ae6ec3fa0f8249458e88ca