Analysis
-
max time kernel
11s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 06:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/146miTSMsOfV2aF1X-ZWcUToPl3Jy9SQP/view?usp=drive_link
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/146miTSMsOfV2aF1X-ZWcUToPl3Jy9SQP/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680057468342646" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 852 chrome.exe 852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 852 chrome.exe 852 chrome.exe 852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 852 wrote to memory of 1980 852 chrome.exe 84 PID 852 wrote to memory of 1980 852 chrome.exe 84 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2432 852 chrome.exe 85 PID 852 wrote to memory of 2264 852 chrome.exe 86 PID 852 wrote to memory of 2264 852 chrome.exe 86 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87 PID 852 wrote to memory of 3588 852 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/146miTSMsOfV2aF1X-ZWcUToPl3Jy9SQP/view?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffce451cc40,0x7ffce451cc4c,0x7ffce451cc582⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,3534734566984028706,12821730215905906895,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,3534734566984028706,12821730215905906895,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,3534734566984028706,12821730215905906895,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,3534734566984028706,12821730215905906895,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,3534734566984028706,12821730215905906895,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4524,i,3534734566984028706,12821730215905906895,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,3534734566984028706,12821730215905906895,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4792 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ac096ff47e1105a85dd341482a1c55f6
SHA1ce24507602b31dd17155dad9883d11138e87aa84
SHA25663728fc7affe661be807e0718d1b0df24b5d991442f972b536f1cba9fef85223
SHA512ccd74a7a90cc25a4362893874eeb3e1273a0ab3e6b80e09589c6007c6ea0a02f148ac2ecab4ab0b77b35151f139a26e3b521e38444d5bfb816da1eeea4098355
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59dafccc77d3b5ca686fec16bdc0616e7
SHA1879c25712e3d420f6f4265a4625679cfa73ccdaa
SHA2563e9e9750b83dd2b56bbc7aed93470c43a6d537e33e665d9804f77f10cfbb7362
SHA512d877ef3cd441d070b5cd469e3cc66f07211503bd4e944c982b0e35d8edc67d84d6ace9ce268bd16c70a8005243ce4a3c42a3cfb354971d6efe286c5a0d3538be
-
Filesize
9KB
MD5265050336f8ac88fb5d3fb6f6947ff17
SHA1c28cab3c01cb39491f766661e635ff910cbf1dd1
SHA2562099f9917966679089fbabd4ade293dc4cb7556a0f8f13d4ee4aa67fd7b0752c
SHA5129608ce0da9727ff59ae527ec4e1bf3c469374e487f4de7ead5b3e1723079d834e6b9c659628877734308b596f149fb7cd2cf99d9f3e208ee80a30cbd426d0c9d
-
Filesize
99KB
MD57ce7116743e44e3be86ec0b0a8da03c2
SHA18d664dc79b2fefdb60d4b352980c083df69a81a2
SHA256c74f5c850df9b0bfbeebbf6d30a3ef333db808def37629f2ed02e3e25f540b18
SHA5120353c9d47bea0f23f976162f60baeb06b632e1bc26b880c31df550cc70a7bb822bc9c5b54ea370010a42acbf8d6fd3ec3502cc644c0496df5734054e1af6aaea